Cisco Systems C819GUK9 Router User Manual


 
9-10
Cisco 819 Series Integrated Services Routers Software Configuration Guide
OL-23590-02
Chapter 9 Configuring Security Features
Configuring VPN
Apply Mode Configuration to the Crypto Map
To apply mode configuration to the crypto map, perform these steps, beginning in global configuration
mode:
SUMMARY STEPS
1. crypto map map-name isakmp authorization list list-name
2. crypto map tag client configuration address [initiate | respond]
DETAILED STEPS
Step 5
exit
Example:
Router(config-isakmp-group)# exit
Router(config)#
Exits IKE group policy configuration mode and
enters global configuration mode.
Step 6
ip local pool {default | pool name}
[low-ip-address {high-ip-address]]
Example:
Router(config)# ip local pool dynpool
30.30.30.20 30.30.30.30
Router(config)#
Specifies a local address pool for the group.
For details about this command and additional
parameters that can be set, see
Cisco IOS Dial
Technologies Command Reference.
Command or Action Purpose
Command or Action Purpose
Step 1
crypto map map-name isakmp authorization
list list-name
Example:
Router(config)# crypto map dynmap isakmp
authorization list rtr-remote
Router(config)#
Applies mode configuration to the crypto map and
enables key lookup (IKE queries) for the group
policy from an authentication, authorization, and
accounting (AAA) server.
Step 2
crypto map tag client configuration address
[initiate | respond]
Example:
Router(config)# crypto map dynmap client
configuration address respond
Router(config)#
Configures the router to reply to mode
configuration requests from remote clients.