Ulterius Technologies LLC FDN40 Manuale Utente
CHAPTER 17: RAVPN
`FDN40ConfigUM/20160505
379
© Ulterius Technologies, LLC 2016. Confidential & Proprietary.
Screen 17-5: IPSec Session Keys Configuration
17.3.7 Configuring Access List
The access list is configured to specify the traffic type, action to be taken, and
source and destination IP address to which the policy is applied. This section
describes the steps involved in configuring the access list.
source and destination IP address to which the policy is applied. This section
describes the steps involved in configuring the access list.
17.3.7.1 CLI Configuration
To configure the access list
-
Enter the Global Configuration mode.
UltOs# configure terminal
-
Enter the Crypto Map Configuration mode for an existing policy.
UltOs(config)# crypto map crypto_map_name
-
Configure the access list.
UltOs(config-crypto-map)# access-list 1 apply any source
192.168.1.0 255.255.255.0 destination 192.168.2.0 255.255.255.0
-
Exit from the Crypto Map Configuration mode
UltOs(config-crypto-map)# end
To view the VPN policy parameters
-
View the parameters of the VPN policy.
UltOs# sh crypto map
VPN Policy Parameters
-------------------------
Policy Name : crypto_map_name
Policy Status : Inactive
Policy Type : IPSec Manual
Ike Version : v1
Local & Remote Protected N/W's : 192.168.1.0/24 <--
--> 192.168.2.0/24
--> 192.168.2.0/24
Security Mode : Tunnel
Local & Remote Tunnel Term Addr : 0.0.0.0 <== ==>
35.0.0.1
35.0.0.1
Interface Name : Not Configured
Policy Protocol : any
Policy Action : Apply
In/Out bound SPI : 256 / 257
Security Protocol : ESP
Authentication Algorithm : HMAC-SHA1
Encryption Algo : DES