ISAKMP Crypto Map Configuration
This section provides instructions for configuring ISAKMP crypto maps.
Important |
This section provides the minimum instruction set for configuring ISAKMP crypto maps on the system. For more information on commands that configure additional parameters and options, refer to the Context Configuration Mode Commands and Crypto Map ISAKMP Configuration Mode chapters in the Command Line Interface Reference. |
To configure the ISAKMP crypto maps for IPSec:
Procedure
Step 1 |
Configure ISAKMP crypto map by applying the example configuration in Configuring ISAKMP Crypto Maps. |
Step 2 |
Verify your ISAKMP crypto map configuration by following the steps in Verifying the ISAKMP Crypto Map Configuration. |
Step 3 |
Save your configuration to flash memory, an external memory device, and/or a network location using the Exec mode command save configuration. For additional information on how to verify and save configuration files, refer to the System Administration Guide and the Command Line Interface Reference. |
Configuring ISAKMP Crypto Maps
Use the following example to create the ISAKMP crypto map:
configure
context ctxt_name
crypto map map_name ipsec-isakmp
set peer agw_address
set isakmp preshared-key isakmp_key
set mode { aggressive | main }
set pfs { group1 | group2 | group5 }
set transform-set transform_name
match address acl_name [ preference ]
match crypto-group group_name { primary | secondary }
end
-
ctxt_name is the system context in which you wish to create and configure the ISAKMP crypto maps.
-
map_name is name by which the ISAKMP crypto map will be recognized by the system.
-
acl_name is name of the pre-configured Access Control List (ACL). It is used for configurations not implementing the IPSec Tunnel Failover feature and match the crypto map to a previously defined crypto ACL. This is an optional parameter.
-
group_name is name of the Crypto group configured in the same context. It is used for configurations employing the IPSec Tunnel Failover feature. This is an optional parameter. For more information, refer to the Redundant IPSec Tunnel Fail-Over chapter of this guide.
-
For more information on parameters, refer to the Crypto Map ISAKMP Configuration Mode Commands chapter in the Command Line Interface Reference.
Verifying the ISAKMP Crypto Map Configuration
Enter the following Exec mode command for the appropriate context to display and verify your ISAKMP crypto map:
show crypto map [ tag map_name | type ipsec-isakmp ]
This command produces an output similar to that displayed below that displays the configuration of a crypto map named test_map2.
Map Name : test_map2
========================================
Payload :
crypto_acl2: permit tcp host 10.10.2.12 neq 35 any
Crypto map Type : ISAKMP
IKE Mode : MAIN
IKE pre-shared key : 3fd32rf09svc
Perfect Forward Secrecy : Group2
Hard Lifetime :
28800 seconds
4608000 kilobytes
Number of Transforms: 1
Transform : test1
AH : none
ESP: md5 3des-cbc
Encaps mode: TUNNEL
Local Gateway: Not Set
Remote Gateway: 192.168.1.1
Caution |
Modification(s) to an existing ISAKMP crypto map configuration will not take effect until the related security association has been cleared. Refer to the clear crypto security-association command located in the Exec Mode Commands chapter of the Command Line Interface Reference for more information. |