EasyManuals Logo
Home>Cisco>Network Router>3925

Cisco 3925 User Manual

Cisco 3925
408 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #146 background imageLoading...
Page #146 background image
138
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Chapter Configuring Security Features
Configuring VPN
Apply Mode Configuration to the Crypto Map
To apply mode configuration to the crypto map, follow these steps, beginning in global configuration
mode.
SUMMARY STEPS
1. crypto map map-name isakmp authorization list list-name
2. crypto map tag client configuration address [initiate | respond]
DETAILED STEPS
Command or Action Purpose
Step 1
crypto map map-name isakmp authorization list
list-name
Example:
Router(config)# crypto map dynmap isakmp
authorization list rtr-remote
Router(config)#
Applies mode configuration to the crypto map and
enables key lookup (IKE queries) for the group
policy from an AAA server.
Step 2
crypto map tag client configuration address
[initiate | respond]
Example:
Router(config)# crypto map dynmap client
configuration address respond
Router(config)#
Configures the router to reply to mode
configuration requests from remote clients.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco 3925 and is the answer not in the manual?

Cisco 3925 Specifications

General IconGeneral
BrandCisco
Model3925
CategoryNetwork Router
LanguageEnglish

Related product manuals