138
Cisco 3900 Series, Cisco 2900 Series, and Cisco 1900 Series Integrated Services Routers Generation 2 Software Configuration Guide
Chapter Configuring Security Features
Configuring VPN
Apply Mode Configuration to the Crypto Map
To apply mode configuration to the crypto map, follow these steps, beginning in global configuration
mode.
SUMMARY STEPS
1. crypto map map-name isakmp authorization list list-name
2. crypto map tag client configuration address [initiate | respond]
DETAILED STEPS
Command or Action Purpose
Step 1
crypto map map-name isakmp authorization list
list-name
Example:
Router(config)# crypto map dynmap isakmp
authorization list rtr-remote
Router(config)#
Applies mode configuration to the crypto map and
enables key lookup (IKE queries) for the group
policy from an AAA server.
Step 2
crypto map tag client configuration address
[initiate | respond]
Example:
Router(config)# crypto map dynmap client
configuration address respond
Router(config)#
Configures the router to reply to mode
configuration requests from remote clients.