Cisco Systems C819GUK9 Router User Manual


 
9-14
Cisco 819 Series Integrated Services Routers Software Configuration Guide
OL-23590-02
Chapter 9 Configuring Security Features
Configuring VPN
Apply the Crypto Map to the Physical Interface
The crypto maps must be applied to each interface through which IPSec traffic flows. Applying the
crypto map to the physical interface instructs the router to evaluate all the traffic against the security
associations database. With the default configurations, the router provides secure connectivity by
encrypting the traffic sent between remote sites. However, the public interface still allows the rest of the
traffic to pass and provides connectivity to the Internet.
To apply a crypto map to an interface, perform these steps, beginning in global configuration mode:
SUMMARY STEPS
1. interface type number
2. crypto map map-name
3. exit
DETAILED STEPS
Where to Go Next
If you are creating a Cisco Easy VPN remote configuration, go to the “Create a Cisco Easy VPN Remote
Configuration” section on page 9-15.
If you are creating a site-to-site VPN using IPSec tunnels and GRE, go to the “Configure a Site-to-Site
GRE Tunnel” section on page 9-17.
Command or Action Purpose
Step 1
interface type number
Example:
Router(config)# interface fastethernet 4
Router(config-if)#
Enters the interface configuration mode for the
interface to which you want the crypto map
applied.
Step 2
crypto map map-name
Example:
Router(config-if)# crypto map static-map
Router(config-if)#
Applies the crypto map to the interface.
See Cisco IOS Security Command Reference for
more details about this command.
Step 3
exit
Example:
Router(config-crypto-map)# exit
Router(config)#
Returns to global configuration mode.