4-14
VPN Acceleration Module 2+ (VAM2+) Installation and Configuration Guide
OL-5979-03
Chapter 4 Configuring the SA-VAM2+
Configuration Tasks
Applying Crypto Map Sets to Interfaces
Apply a crypto map set to each interface through which IPSec traffic will flow. Crypto maps instruct the
router to evaluate the interface traffic against the crypto map set and use the specified policy during
connection or security association negotiation on behalf of traffic to be protected by crypto.
To apply a crypto map set to an interface, use the following command in interface configuration mode:
To specify redundant interfaces and name an identifying interface, use the following command in global
configuration mode:
Configuring Compression
This section includes the following topics:
•
Configure IKE Policy
(required)
•
Configure IKE Preshared Key
(required)
•
Configure ipsec transform set
(required)
•
Configure access-list
(required)
•
Configure crypto map
(required)
•
Apply crypto map to the Interface
(required)
For IPSec configuration examples, refer to the
“Configuring Compression Example”
.
See the “Configuring IPSec Network Security” of the
Cisco IOS Security Configuration Guide
for more
information on configuring IPSec.
Configure IKE Policy
To configure IKE policy, follow the steps in
“Configuring an IKE Policy” on page 3,
using the commands
in global configuration mode.
Command
Purpose
Router(config)#
crypto map
map-name seq-num
ipsec-isakmp dynamic
dynamic-map-name
Adds a dynamic crypto map set to a static crypto
map set.
Command
Purpose
Router(config-if)#
crypto map
map-name
Applies a crypto map set to an interface.
Command
Purpose
Router(config)#
crypto map
map-name
local-address
interface-id
Permits redundant interfaces to share the same
crypto map, using the same local identity.