27-16
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 27 Configuring IPSec and ISAKMP
Configuring IPSec
Figure 27-2
shows the cascading ACLs created from the conceptual ACEs above. The meaning of each
symbol in the figure follows.
Crypto map within a crypto map set.
(Gap in a straight line) Exit from a crypto map when a packet
matches an ACE.
Packet that fits the description of one ACE. Each size ball
represents a different packet matching the respective ACE in the
figure. The differences in size merely represent differences in the
source and destination of each packet.
Redirection to the next crypto map in the crypto map set.
Response when a packet either matches an ACE or fails to match
all of the permit ACEs in a crypto map set.
Summary of Contents for 500 Series
Page 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Page 45: ...P A R T 1 Getting Started and General Information ...
Page 46: ......
Page 277: ...P A R T 2 Configuring the Firewall ...
Page 278: ......
Page 561: ...P A R T 3 Configuring VPN ...
Page 562: ......
Page 891: ...P A R T 4 System Administration ...
Page 892: ......
Page 975: ...P A R T 5 Reference ...
Page 976: ......