Apply Mode Configuration To The Crypto Map - Cisco 1812W - Integrated Services Router Wireless Configuration Manual

1800 series integrated services routers
Hide thumbs Also See for 1812W - Integrated Services Router Wireless:
Table of Contents

Advertisement

Chapter 6
Configuring a VPN Using Easy VPN and an IPSec Tunnel
Command or Action
Step 5
exit
Example:
Router(config-isakmp-group)# exit
Router(config)#
Step 6
ip local pool {default | poolname}
[low-ip-address [high-ip-address]]
Example:
Router(config)# ip local pool dynpool
30.30.30.20 30.30.30.30
Router(config)#

Apply Mode Configuration to the Crypto Map

Perform these steps to apply mode configuration to the crypto map, beginning in global configuration
mode:
Command or Action
Step 1
crypto map map-name isakmp authorization list
list-name
Example:
Router(config)# crypto map dynmap isakmp
authorization list rtr-remote
Router(config)#
Step 2
crypto map tag client configuration address
[initiate | respond]
Example:
Router(config)# crypto map dynmap client
configuration address respond
Router(config)#
OL-6426-02
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
Apply Mode Configuration to the Crypto Map
Purpose
Exits IKE group policy configuration mode, and
enters global configuration mode.
Specifies a local address pool for the group.
For details about this command and additional
parameters that can be set, see the
Technologies Command
Reference.
Purpose
Applies mode configuration to the crypto map and
enables key lookup (IKE queries) for the group
policy from an authentication, authorization, and
accounting (AAA) server.
Configures the router to reply to mode
configuration requests from remote clients.
Cisco IOS Dial
6-5

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents