36-7
Cisco Security Appliance Command Line Configuration Guide
OL-12172-03
Chapter 36 Configuring LAN-to-LAN IPSec VPNs
Creating a Crypto Map and Applying It To an Interface
Step 2
To identify the peer (s) for the IPSec connection, enter the
crypto map set peer
command.
The syntax is
crypto map
map-name seq-num
set peer
{
ip_address1
|
hostname1
}[...
ip_address10
|
hostname10
]. In the following example the peer name is 10.10.4.108.
hostname(config)#
crypto map abcmap 1 set peer 10.10.4.108
hostname(config)#
Step 3
To specify a transform set for a crypto map entry, enter the
crypto map set transform-set
command.
The syntax is
crypto map
map-name seq-num
set transform-set
transform-set-name
. In the following
example the transform set name is FirstSet.
hostname(config)#
crypto map abcmap 1 set transform-set FirstSet
hostname(config)#
Applying Crypto Maps to Interfaces
You must apply a crypto map set to each interface through which IPSec traffic travels. The security
appliance supports IPSec on all interfaces. Applying the crypto map set to an interface instructs the
security appliance to evaluate all interface traffic against the crypto map set and to use the specified
policy during connection or security association negotiations.
Binding a crypto map to an interface also initializes the runtime data structures, such as the security
association database and the security policy database. When you later modify a crypto map in any way,
the security appliance automatically applies the changes to the running configuration. It drops any
existing connections and reestablishes them after applying the new crypto map.
Step 1
To apply the configured crypto map to the outside interface, enter the
crypto map interface
command.
The syntax is
crypto map
map-name
interface
interface-name.
hostname(config)#
crypto map abcmap interface outside
hostname(config)#
Step 2
Save your changes.
hostname(config)#
write memory
hostname(config)#
Содержание 500 Series
Страница 38: ...Contents xxxviii Cisco Security Appliance Command Line Configuration Guide OL 12172 03 ...
Страница 45: ...P A R T 1 Getting Started and General Information ...
Страница 46: ......
Страница 277: ...P A R T 2 Configuring the Firewall ...
Страница 278: ......
Страница 354: ...17 38 Cisco Security Appliance Command Line Configuration Guide OL 12172 03 Chapter 17 Configuring NAT NAT Examples ...
Страница 561: ...P A R T 3 Configuring VPN ...
Страница 562: ......
Страница 891: ...P A R T 4 System Administration ...
Страница 892: ......
Страница 975: ...P A R T 5 Reference ...
Страница 976: ......