4-9
VPN Acceleration Module 2+ (VAM2+) Installation and Configuration Guide
OL-5979-03
Chapter 4 Configuring the SA-VAM2+
Configuration Tasks
Creating Crypto Access Lists
Crypto access lists define which IP traffic will be protected by encryption. (These access lists are
not
the
same as regular access lists, which determine what traffic to forward or block at an interface.) For
example, access lists can be created to protect all IP traffic between Subnet A and Subnet Y or Telnet
traffic between Host A and Host B.
To create crypto access lists, use the following command in global configuration mode:
Step
Command
Purpose
Step 1
Router#
enable
Enables privileged EXEC mode. Enter your password if
prompted.
Step 2
Router#
configure terminal
Enters global configuration mode.
Step 3
Router(config)#
crypto ipsec
security-association lifetime seconds
seconds
Changes global lifetime values used when negotiating
IPSec security associations (SAs). To reset a lifetime to
the default value, use the no form of this command.
Specifies the number of seconds a security association
will live before expiring. The default is 3600 seconds (one
hour).
Step 4
Router(config)#
crypto ipsec
security-association lifetime kilobytes
kilobytes
Changes the global “traffic-volume” lifetime for IPSec
SAs.
Specifies the volume of traffic (in kilobytes) that can pass
between IPSec peers using a given security association
before that security association expires. The default is
4,608,000 kilobytes.
Step 5
Router(config)#
clear crypto sa
or
Router(config)#
clear crypto sa peer
{
ip-address
|
peer-name
}
or
Router(config)#
clear crypto sa map
map-name
or
Router (config)#
clear crypto sa entry
destination-address protocol spi
(Optional) Clears existing security associations. This
causes any existing security associations to expire
immediately; future security associations will use the new
lifetimes. Otherwise, any existing security associations
will expire according to the previously configured
lifetimes.
Note
Using the
clear crypto sa
command without
parameters will clear out the full SA database,
which will clear out active security sessions. You
may also specify the
peer
,
map
, or
entry
keywords to clear out only a subset of the SA
database. For more information, see the
clear
crypto sa
command.