Cisco PIX 525 Specifikace Strana 465

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 604
  • Tabulka s obsahem
  • ŘEŠENÍ PROBLÉMŮ
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 464
28-7
Cisco Security Appliance Command Line Configuration Guide
OL-6721-01
Chapter 28 Configuring LAN-to-LAN VPNs
Creating a Crypto Map and Applying It To an Interface
Enter these commands in global configuration mode:
Step 1 To assign an access list to a crypto map entry, enter the crypto map match address command.
The syntax is crypto map map-name seq-num match address aclname. In the following example the
map name is abcmap, the sequence number is 1, and the access list name is xyz.
hostname(config)# crypto map abcmap 1 match address xyz
hostname(config)#
Step 2 To identify the peer (s) for the IPSec connection, enter the crypto map set peer command.
The syntax is crypto map map-name seq-num set peer {ip_address1 | hostname1}[... ip_address10 |
hostname10]. In the following example the peer name is 10.10.4.108.
hostname(config)# crypto map abcmap 1 set peer 10.10.4.108
hostname(config)#
Step 3 To specify a transform set for a crypto map entry, enter the crypto map set transform-set command.
The syntax is crypto map map-name seq-num set transform-set transform-set-name. In the following
example the transform set name is FirstSet.
hostname(config)# crypto map abcmap 1 set transform-set FirstSet
hostname(config)#
Applying Crypto Maps to Interfaces
You must apply a crypto map set to each interface through which IPSec traffic travels. The security
appliance supports IPSec on all interfaces. Applying the crypto map set to an interface instructs the
security appliance to evaluate all interface traffic against the crypto map set and to use the specified
policy during connection or security association negotiations.
Binding a crypto map to an interface also initializes the runtime data structures, such as the security
association database and the security policy database. When you later modify a crypto map in any way,
the security appliance automatically applies the changes to the running configuration. It drops any
existing connections and reestablishes them after applying the new crypto map.
Step 1 To apply the configured crypto map to the outside interface, enter the crypto map interface command.
The syntax is crypto map map-name interface interface-name.
hostname(config)# crypto map abcmap interface outside
hostname(config)#
Step 2 Save your changes.
hostname(config)# write memory
hostname(config)#
Zobrazit stránku 464
1 2 ... 460 461 462 463 464 465 466 467 468 469 470 ... 603 604

Komentáře k této Příručce

Žádné komentáře