Chapter
Configuring Security Features
Configure the IPSec Crypto Method and Parameters
A dynamic crypto map policy processes negotiation requests for new security associations from remote
IPSec peers, even if the router does not know all the crypto map parameters (for example, IP address).
To configure the IPSec crypto method, follow these steps, beginning in global configuration mode.
SUMMARY STEPS
1.
2.
3.
4.
5.
DETAILED STEPS
Command or Action
Step 1
crypto dynamic-map dynamic-map-name
dynamic-seq-num
Example:
Router(config)# crypto dynamic-map dynmap 1
Router(config-crypto-map)#
Step 2
set transform-set transform-set-name
[transform-set-name2...transform-set-name6]
Example:
Router(config-crypto-map)# set
transform-set vpn1
Router(config-crypto-map)#
Step 3
reverse-route
Example:
Router(config-crypto-map)# reverse-route
Router(config-crypto-map)#
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
crypto dynamic-map dynamic-map-name dynamic-seq-num
set transform-set transform-set-name [transform-set-name2...transform-set-name6]
reverse-route
exit
crypto map map-name seq-num [ipsec-isakmp] [dynamic dynamic-map-name] [discover]
[profile profile-name]
Purpose
Creates a dynamic crypto map entry and enters
crypto map configuration mode.
See
Cisco IOS Security Command Reference
more detail about this command.
Specifies which transform sets can be used with
the crypto map entry.
Creates source proxy information for the crypto
map entry.
See
Cisco IOS Security Command Reference
details.
Configuring VPN
for
for
141