Cisco Cisco Packet Data Gateway (PDG)
IPSec Network Applications
Implementing IPSec for L2TP Applications ▀
IPSec Reference, StarOS Release 17 ▄
41
Step 3
Configure an ipsec-isakmp crypto map according to the instructions located in the Dynamic Crypto Map Configuration
section of the Crypto Maps chapter of this guide.
section of the Crypto Maps chapter of this guide.
Step 4
Configure the subscriber profile attributes according to the instructions located in the Subscriber Attributes for L2TP
Application IPSec Support section of the RADIUS Attributes for IPSec-Based Mobile IP chapter of this guide.
Application IPSec Support section of the RADIUS Attributes for IPSec-Based Mobile IP chapter of this guide.
Step 5
Save your configuration to flash memory, an external memory device, and/or a network location using the Exec mode
command save configuration. For additional information on how to verify and save configuration files, refer to the
System Administration Guide and the Command Line Interface Reference.
command save configuration. For additional information on how to verify and save configuration files, refer to the
System Administration Guide and the Command Line Interface Reference.
How IPSec is Used for PDSN Compulsory L2TP Configuration
The following figure and the text that follows describe how IPSec-encrypted PDSN compulsory L2TP sessions are
processed by the system.
processed by the system.
Figure 5.
PDSN Compulsory L2TP, IPSec-Encrypted Session Processing