▀ Crypto Map and Interface Association
Crypto Map and Interface Association
This section provides instructions for applying manual or ISAKMP crypto maps to interfaces configured on the system.
Dynamic crypto maps should not be applied to interfaces.
Important:
an interface on the system. For more information on commands that configure additional parameters and options, refer
to the Command Line Interface Reference.
To apply the crypto maps to an interface:
Step 1
Configure a manual or ISAKMP crypto map by applying the example configuration in any of the following sections:
Step 2
Apply desired crypto map to system interface by following the steps in the
section
Step 3
Verify your manual crypto map configuration by following the steps in the
Crypto Map
section.
Step 4
Save your configuration to flash memory, an external memory device, and/or a network location using the Exec mode
command
save configuration
System Administration Guide and the Command Line Interface Reference.
Applying Crypto Map to an Interface
Use the following example to apply an existing crypto map to an interface on your system:
configure
context <ctxt_name>
interface <interface_name>
crypto-map <map_name>
end
Notes:
<
ctxt_name
<
interface_name
be applied.
<
map_name
Verifying the Interface Configuration with Crypto Map
These instructions are used to verify the interface configuration with crypto map.
▄ Cisco ASR 5000 Series 3G Home NodeB Gateway Administration Guide
164
This section provides the minimum instruction set for applying manual or ISAKMP crypto maps to
. For additional information on how to verify and save configuration files, refer to the
> is the system context in which the interface is configured to apply crypto map.
> is the name of a specific interface configured in the context to which the crypto map will
> is name of the preconfigured ISAKMP or a manual crypto map.
Applying Crypto Map to an Interface
Verifying the Interface Configuration with
IP Security
OL-25069-03