This task explains
how to configure Tunnel-IPSec interfaces.
To use the profile
command, you must be in a user group associated with a task group that includes
the proper task IDs for crypto commands. To use the
tunnel
destination command, you must be in a user group
associated with a task group that includes the proper task IDs for interface
commands.
For detailed
information about user groups and task IDs, see the
Configuring AAA
Services
module of
System Security
Configuration Guide for the Cisco NCS 6000 Series Routers The following
tasks are required for creating Tunnel-IPSec interfaces:
- Setting Global Lifetimes for
IPSec Security Associations
- Configuring Checkpointing
- Configuring Crypto Profiles
For detailed
information on configuring the prerequisite checkpointing and crypto profiles,
and setting the global lifetimes for IPSec security associations, refer to the
Implementing IPSec
Network Security
module in
System Security
Configuration Guide for Cisco NCS 6000 Series Routers .
After configuring
crypto profiles, you must apply a crypto profile to each tunnel interface
through which IPSec traffic will flow. Applying the crypto profile set to a
tunnel interface instructs the router to evaluate all the interface's traffic
against the crypto profile set and to use the specified policy during
connection or security association negotiation on behalf of traffic to be
protected by crypto.