Cisco Systems OL-6426-02 Benutzerhandbuch

Seite von 196
B E TA   D R A F T   -   C I S C O   C O N F I D E N T I A L
6-5
Cisco 1800 Series Integrated Services Routers (Fixed) Software Configuration Guide
OL-6426-02
Chapter 6      Configuring a VPN Using Easy VPN and an IPSec Tunnel
  Apply Mode Configuration to the Crypto Map
Apply Mode Configuration to the Crypto Map
Perform these steps to apply mode configuration to the crypto map, beginning in global configuration 
mode:
Step 5
exit
Example:
Router(config-isakmp-group)# exit
Router(config)# 
Exits IKE group policy configuration mode, and 
enters global configuration mode.
Step 6
ip local pool {default | poolname
[low-ip-address [high-ip-address]]
Example:
Router(config)# ip local pool dynpool 
30.30.30.20 30.30.30.30
Router(config)# 
Specifies a local address pool for the group.
For details about this command and additional 
parameters that can be set, see the
Command or Action
Purpose
Command or Action
Purpose
Step 1
crypto map map-name isakmp authorization list 
list-name
Example:
Router(config)# crypto map dynmap isakmp 
authorization list rtr-remote
Router(config)# 
Applies mode configuration to the crypto map and 
enables key lookup (IKE queries) for the group 
policy from an authentication, authorization, and 
accounting (AAA) server.
Step 2
crypto map tag client configuration address 
[initiate | respond] 
Example:
Router(config)# crypto map dynmap client 
configuration address respond
Router(config)# 
Configures the router to reply to mode 
configuration requests from remote clients.