Contents
v
VPN Acceleration Module 2+ (VAM2+) Installation and Configuration Guide
OL-5979-03
Defining a Transform Set
4 - 5
IPSec Protocols: AH and ESP
4 - 6
Selecting Appropriate Transforms
4 - 7
The Crypto Transform Configuration Mode
4 - 7
Changing Existing Transforms
4 - 7
Transform Example
4 - 8
Configuring IPSec
4 - 8
Ensuring That Access Lists Are Compatible with IPSec
4 - 8
Setting Global Lifetimes for IPSec Security Associations
4 - 8
Creating Crypto Access Lists
4 - 9
Creating Crypto Map Entries
4 - 10
Creating Dynamic Crypto Maps
4 - 12
Applying Crypto Map Sets to Interfaces
4 - 14
Configuring Compression
4 - 14
Configure IKE Policy
4 - 14
Configure IKE Preshared Key
4 - 15
Configure ipsec transform set
4 - 15
Configure access-list
4 - 15
Configure crypto map
4 - 16
Apply crypto map to the Interface
4 - 16
Monitoring and Maintaining IPSec
4 - 17
IPSec Configuration Example
4 - 17
Verifying IKE and IPSec Configurations
4 - 18
Verifying the Configuration
4 - 19
Configuration Examples
4 - 21
Configuring IKE Policies Example
4 - 21
Configuring IPSec Configuration Example
4 - 21
Configuring Compression Example
4 - 22
Basic IPSec Configuration Illustration
4 - 22
Router A Configuration
4 - 23
Router B Configuration
4 - 24
Troubleshooting Tips
4 - 24
Monitoring and Maintaining the SA-VAM2+
4 - 26
I
N D E X