Cisco Cisco Packet Data Gateway (PDG)
Crypto Maps
▀ Crypto Map and Interface Association
▄ IPSec Reference, StarOS Release 18
74
Crypto Map and Interface Association
This section provides instructions for applying manual or ISAKMP crypto maps to interfaces configured under StarOS.
Important:
Dynamic crypto maps should not be applied to interfaces.
Important:
This section provides the minimum instruction set for applying manual or ISAKMP crypto maps to
an interface on the system. For more information on commands that configure additional parameters and options, refer
to the Command Line Interface Reference.
to the Command Line Interface Reference.
To apply the crypto maps to an interface:
Step 1
Configure a manual or ISAKMP crypto map.
Step 2
Step 3
Step 4
Save your configuration to flash memory, an external memory device, and/or a network location using the Exec mode
command save configuration. For additional information on how to verify and save configuration files, refer to the
System Administration Guide and the Command Line Interface Reference.
command save configuration. For additional information on how to verify and save configuration files, refer to the
System Administration Guide and the Command Line Interface Reference.
Applying a Crypto Map to an Interface
Use the following example to apply an existing crypto map to an interface on your system:
configure
context ctxt_name
interface interface_name
crypto-map map_name
end
Notes:
ctxt_name is the system context in which the interface is configured to apply crypto map.
interface_name is the name of a specific interface configured in the context to which the crypto map will be
applied.
map_name is name of the preconfigured ISAKMP or a manual crypto map.