
4-24
VPN Acceleration Module 2+ (VAM2+) Installation and Configuration Guide
OL-5979-03
Chapter 4 Configuring the SA-VAM2+
Troubleshooting Tips
access-list 101 permit ip host 10.0.0.2 host 10.2.2.2
access-list 101 permit ip host 10.0.0.3 host 10.2.2.3
Router B Configuration
Specify the parameters to be used during an IKE negotiation:
crypto isakmp policy 15
encryption des
hash md5
authentication pre-share
group 2
lifetime 5000
crypto isakmp key 1234567890 address 10.0.0.3
crypto isakmp identity address
A transform set defines how the traffic will be protected:
crypto ipsec transform-set auth1 ah-md5-hmac esp-des ah-md5-hmac
mode tunnel
A crypto map joins the transform set and specifies where the protected traffic is sent (the remote IPSec
peer):
crypto map toRemoteSite 10 ipsec-isakmp
set peer 10.0.0.3
set transform-set auth1
The crypto map is applied to an interface:
interface Serial0
ip address 10.2.2.3
crypto map toRemoteSite
An IPSec access list defines which traffic to protect:
access-list 101 permit ip host 10.2.2.2 host 10.0.0.2
access-list 101 permit ip host 10.2.2.3 host 10.0.0.3
Troubleshooting Tips
To verify that Cisco IOS software has recognized SA-VAM2+, enter the
show diag
command and check
the output. For example, when the router has the SA-VAM2+ in slot 4, the following output appears:
Router#
show diag 4
Slot 4:
VAM2+ Encryption/Compression engine, Port adapter
Port adapter is analyzed
Port adapter insertion time 00:16:17 ago
EEPROM contents at hardware discovery:
Hardware Revision :4.0
EEPROM format version 4
EEPROM contents (hex):
0x00:04 FF 40 04 B0 41 04 00 FF FF FF FF FF FF FF FF
0x10:FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF
0x20:FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF
0x30:FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF FF