36-6
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 36 Configuring LAN-to-LAN IPSec VPNs
Creating a Crypto Map and Applying It To an Interface
hostname(config
-
ipsec)#
pre-shared-key 44kkaol59636jnfx
Step 3
Save your changes.
hostname(config)#
write memory
hostname(config)#
Creating a Crypto Map and Applying It To an Interface
Crypto map entries pull together the various elements of IPSec security associations, including the
following:
•
Which traffic IPSec should protect, which you define in an access list.
•
Where to send IPSec-protected traffic, by identifying the peer.
•
What IPSec security applies to this traffic, which a transform set specifies.
•
The local address for IPSec traffic, which you identify by applying the crypto map to an interface.
For IPSec to succeed, both peers must have crypto map entries with compatible configurations. For two
crypto map entries to be compatible, they must, at a minimum, meet the following criteria:
•
The crypto map entries must contain compatible crypto access lists (for example, mirror image
access lists). If the responding peer uses dynamic crypto maps, the entries in the security appliance
crypto access list must be “permitted” by the peer’s crypto access list.
•
The crypto map entries each must identify the other peer (unless the responding peer is using a
dynamic crypto map).
•
The crypto map entries must have at least one transform set in common.
If you create more than one crypto map entry for a given interface, use the sequence number (seq-num)
of each entry to rank it: the lower the seq-num, the higher the priority. At the interface that has the crypto
map set, the security appliance evaluates traffic against the entries of higher priority maps first.
Create multiple crypto map entries for a given interface if either of the following conditions exist:
•
Different peers handle different data flows.
•
You want to apply different IPSec security to different types of traffic (to the same or separate peers),
for example, if you want traffic between one set of subnets to be authenticated, and traffic between
another set of subnets to be both authenticated and encrypted. In this case, define the different types
of traffic in two separate access lists, and create a separate crypto map entry for each crypto access
list.
To create a crypto map and apply it to the outside interface in global configuration mode, enter several
of the
crypto map
commands. These commands use a variety of arguments, but the syntax for all of them
begin with
crypto map
map-name-seq-num
. In the following example the map-name is abcmap, the
sequence number is 1.
Enter these commands in global configuration mode:
Step 1
To assign an access list to a crypto map entry, enter the
crypto map match address
command.
The syntax is
crypto map
map-name seq-num
match address
aclname
. In the following example the
map name is abcmap, the sequence number is 1, and the access list name is
l2l_list
.
hostname(config)#
crypto map abcmap 1 match address l2l_list
hostname(config)#
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......