27-11
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 27 Configuring IPSec and ISAKMP
Configuring IPSec
The following example enables mapping of certificate-based ISAKMP sessions to a tunnel group based
on the IP address of the peer:
hostname(config)#
tunnel-group-map enable peer-ip
hostname(config)#
The following example enables mapping of certificate-based ISAKMP sessions based on the
organizational unit (OU) in the subject distinguished name (DN):
hostname(config)#
tunnel-group-map enable ou
hostname(config)#
The following example enables mapping of certificate-based ISAKMP sessions based on established
rules:
hostname(config)#
tunnel-group-map enable rules
hostname(config)#
Using the Tunnel-group-map default-group Command
This command specifies a default tunnel group to use when the configuration does not specify a tunnel
group.
The syntax is
tunnel-group-map
[
rule-index
]
default-group
tunnel-group-name
where the
rule-index
is the priority for the rule, and
tunnel-group name
must be for a tunnel group that already exists.
Configuring IPSec
This section provides background information about IPSec and describes the procedures required to
configure the security appliance when using IPSec to implement a VPN. It contains the following topics:
•
Understanding IPSec Tunnels, page 27-11
•
Understanding Transform Sets, page 27-12
•
Defining Crypto Maps, page 27-12
•
Applying Crypto Maps to Interfaces, page 27-20
•
Using Interface Access Lists, page 27-20
•
Changing IPSec SA Lifetimes, page 27-22
•
Creating a Basic IPSec Configuration, page 27-22
•
Using Dynamic Crypto Maps, page 27-24
•
Providing Site-to-Site Redundancy, page 27-26
•
Viewing an IPSec Configuration, page 27-26
Understanding IPSec Tunnels
IPSec tunnels are sets of SAs that the security appliance establishes between peers. The SAs define the
protocols and algorithms to apply to sensitive data, and also specify the keying material the peers use.
IPSec SAs control the actual transmission of user traffic. SAs are unidirectional, but are generally
established in pairs (inbound and outbound).
The peers negotiate the settings to use for each SA. Each SA consists of the following:
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......