Cisco Cisco Packet Data Gateway (PDG) Guia De Resolução De Problemas
Context Configuration Mode Commands
▀ crypto map
▄ Cisco ASR 5000 Series Command Line Interface Reference
OL-22947-02
IKEv1 crypto maps: These tunnels are similar to manual crypto maps in that they require some
statically configured information such as the IP address of a peer security gateway and that they are
applied to specific system interfaces. However, IKEv1 crypto maps offer greater security because
they rely on dynamically generated security associations through the use of the Internet Key
Exchange (IKE) protocol.
applied to specific system interfaces. However, IKEv1 crypto maps offer greater security because
they rely on dynamically generated security associations through the use of the Internet Key
Exchange (IKE) protocol.
IKEv2-IPv6 crypto maps: Used to protect X3 data between a P-GW and a Lawful Intercept server.
Dynamic crypto maps: These tunnels are used for protecting L2TP-encapsulated data between the
system and an LNS/security gateway or Mobile IP data between an FA service configured on one
system and an HA service configured on another.
system and an HA service configured on another.
Important:
The crypto map type (dynamic, IKEv1, IKEv2-IPv6, or manual) is specified when the map is first
created using this command.
Example
Create a dynamic crypto map named map1 and enter the Crypto Map Dynamic Configuration Mode by entering the
following command:
Create a dynamic crypto map named map1 and enter the Crypto Map Dynamic Configuration Mode by entering the
following command: