4-16
VPN Acceleration Module 2+ (VAM2+) Installation and Configuration Guide
OL-5979-03
Chapter 4 Configuring the SA-VAM2+
Configuration Tasks
Configure crypto map
To create crypto map entries that use IKE to establish the security associations, use the following
commands, starting in global configuration mode:
Apply crypto map to the Interface
To apply a crypto map set to an interface, use the following commands, starting in global configuration
mode:
This completes the process for configuring compression on the SA-VAM2+.
Command
Purpose
Router (config)#
access-list
access-list-number
{
permit
|
deny
} address mask
access-list-number
Specify an integer from 700 to 799 that you select for the list.
permit
Permits the frame.
deny
Denies the frame.
address mask
Specify 48-bit MAC addresses written in dotted triplet form. The
ones bits in the mask argument are the bits to be ignored in the
address value.
Command
Purpose
Step 1
Router (config)#
crypto map
map-name seq-num
ipsec-isakmp
Create the crypto map and enter crypto map
configuration mode.
Step 2
Router (config)#
set peer
{
hostname
|
ip-address
}
Specify a remote IPSec peer. This is the peer to which
IPSec-protected traffic can be forwarded.
Repeat for multiple remote peers.
Step 3
Router (config)#
set transform-set
transform-set-name1
[transform-set-name2...transform-set-name6]
Specify which transform sets are allowed for this
crypto map entry. List multiple transform sets in
order of priority (highest priority first).
Step 4
Router (config)#
match address
access-list-id
Specify an extended access list. This access list
determines which traffic is protected by IPSec and
which is not.
Command
Purpose
Step 1
Router (config)#
interface
type number
Specify an interface on which to apply the crypto
map and enter interface configuration mode.
Step 2
Router (config)#
crypto map
map-name
Apply a crypto map set to an interface.
Step 3
Router (config)#
end
Exit interface configuration mode.