138
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Chapter Configuring Security Features
Configuring VPN
Apply Mode Configuration to the Crypto Map
To
apply mode configuration to the crypto map
,
follow these steps
,
beginning in global configuration
mode
.
SUMMARY STEPS
1.
crypto map
map-name
isakmp authorization list
list-name
2.
crypto map
tag
client configuration address
[
initiate
|
respond
]
DETAILED STEPS
Command or Action
Purpose
Step 1
crypto map
map-name
isakmp authorization list
list-name
Example:
Router(config)# crypto map dynmap isakmp
authorization list rtr-remote
Router(config)#
Applies mode configuration to the crypto map and
enables key lookup (IKE queries) for the group
policy from an AAA server.
Step 2
crypto map
tag
client configuration address
[
initiate
|
respond
]
Example:
Router(config)# crypto map dynmap client
configuration address respond
Router(config)#
Configures the router to reply to mode
configuration requests from remote clients.