Cisco Systems

 


Modules:  1  |  2  |  3  |  4  |  5  |  6  |  7  |  8  |  9  |  10  |  11  |  12  |  13  |  CS 1  |  CS 2  |  All  |
Module 13: Virtual Private Networks
 
13.5.2 Step 1 – Enable IKE

Router(config)# crypto isakmp enable

 

13.5.4 Step 2 – Create IKE Policies with the crypto isakmp command

Router(config)# crypto isakmp policy priority
Router(config-isakmp)# authentication {rsa-sig | rsa-encr | pre-share}
Router(config-isakmp)# encryption {des | 3des}
Router(config-isakmp)# hash {sha | md5}
Router(config-isakmp)# group {1 | 2}
Router(config-isakmp)# lifetime seconds

 

13.5.7 Step 7 - Configure pre-shared keys

Router(config)# crypto isakmp key keystring address peer-address [mask]

 

13.6.2 Step 1 – Configure transforms set suites

Router(config)# crypto ipsec transform-set transform-set-name transform1 [transform2 [transform3]]
Router(cfg-crypto-trans)# mode [tunnel | transport]
 

13.6.6 Step 3 – Create crypto ACLs using extended access-lists

Router(config-if)#access-list acl-index {deny | permit} protocol source source-wildcard destination destination-wildcard [precedence precedence][tos tos] [log]
 

13.6.10 Step 4 - Configure IPSec Crypto maps

Router(config-crypto-map)# crypto map map-name seq-num ipsec-isakmp [dynamic dynamic-map-name] [discover]
Router(config-crypto-map)# match address [access-list-id | name]
Router(config-crypto-map)# set peer {hostname | ip-address}
Router(config-crypto-map)# set transform-set transform-set-name [transform-set-name2...transform-set-name6]
Router(config-crypto-map)# set security-association lifetime {seconds seconds | kilobytes kilobytes}
 

13.6.12 Step 5 – Apply crypto maps to interfaces

Router(config-if)#crypto map map-name
 

13.7.1 Task 4 – Test and verify IPSec

Router# show crypto isakmp policy
Router# show crypto ipsec transform-set [tag transform-set-name]
Router(config)#debug crypto ipsec
Router(config)#debug crypto iskmp
 

Close Window
All contents copyright © 2003 Cisco Systems, Inc. All rights reserved.