Cisco Cisco Packet Data Gateway (PDG) Guia De Resolução De Problemas
Crypto Map IKEv2-IPv6 Configuration Mode Commands
▀ match
▄ Cisco ASR 5000 Series Command Line Interface Reference
OL-22947-02
match
Matches or associates the crypto map to an access control list (ACL) configured in the same context.
Product
P-GW
Privilege
Administrator
Syntax
Removes a previously matched ACL.
The name of the ACL that the crypto map is to be matched with.
can be from 1 to 79 alpha and/or numeric characters and is case sensitive.
Default: 0
Specifies the preference of the ACL. The ACL preference is factored when a single packet matches the
criteria of more than one ACL.
The preference can be configured to any integer value from 0 to 4294967295. ―0‖ is the highest priority.
Specifies the preference of the ACL. The ACL preference is factored when a single packet matches the
criteria of more than one ACL.
The preference can be configured to any integer value from 0 to 4294967295. ―0‖ is the highest priority.
Important:
The priorities are only compared for ACLs matched to other crypto maps or to policy ACLs (those
applied to the entire context).
Usage
ACLs matched to crypto maps are referred to as crypto ACLs. Crypto ACLs define the criteria that must be
met in order for a subscriber data packet to routed over an IPSec tunnel.
Prior to routing, the system examines the properties of each subscriber data packet. If the packet properties
match the criteria specified in the crypto ACL, the system will initiate the IPSec policy dictated by the crypto
map.
met in order for a subscriber data packet to routed over an IPSec tunnel.
Prior to routing, the system examines the properties of each subscriber data packet. If the packet properties
match the criteria specified in the crypto ACL, the system will initiate the IPSec policy dictated by the crypto
map.
Example
The following command sets the crypto map ACL to the ACL named
The following command sets the crypto map ACL to the ACL named
and sets the crypto maps priority to
the highest level.