Cisco Cisco Packet Data Gateway (PDG)
Crypto Maps
Dynamic Crypto Map Configuration ▀
IPSec Reference, StarOS Release 16 ▄
71
Verifying the Dynamic Crypto Map Configuration
Enter the following Exec mode command for the appropriate context to display and verify your dynamic crypto map
configuration:
configuration:
show crypto map [ tag map_name | map-type ipsec-dynamic ]
This command produces an output similar to that displayed below using the configuration of a dynamic crypto map
named test_map3.
named test_map3.
Map Name : test_map3
========================================
Crypto map Type : ISAKMP (Dynamic)
IKE Mode : MAIN
IKE pre-shared key :
Perfect Forward Secrecy : Group2
Hard Lifetime :
28800 seconds
4608000 kilobytes
Transform : test1
AH : none
ESP: md5 3des-cbc
Encaps mode: TUNNEL
Local Gateway: Not Set
Remote Gateway: Not Set
========================================
Crypto map Type : ISAKMP (Dynamic)
IKE Mode : MAIN
IKE pre-shared key :
Perfect Forward Secrecy : Group2
Hard Lifetime :
28800 seconds
4608000 kilobytes
Transform : test1
AH : none
ESP: md5 3des-cbc
Encaps mode: TUNNEL
Local Gateway: Not Set
Remote Gateway: Not Set
Caution:
Modification(s) to an existing dynamic crypto map configuration will not take effect until
the related security association has been cleared. Refer to the clear crypto security-association command
located in the Exec Mode Commands chapter of the Command Line Interface Reference for more information.
located in the Exec Mode Commands chapter of the Command Line Interface Reference for more information.