Cisco Systems 2.5 Network Router User Manual


  Open as PDF
of 1002
 
Chapter 11 Site-to-Site VPN
Create Site to Site VPN
11-14
Cisco Router and Security Device Manager 2.5 User’s Guide
OL-4015-12
All traffic going to the hosts in this subnet will be protected.
Create/Select an access-list for IPSec traffic
Use this option if you need to specify multiple sources and destinations, and/or
specific types of traffic to encrypt. An IPSec rule can consist of multiple entries,
each specifying different traffic types and different sources and destinations.
Click the button next to the field, and specify an existing IPSec rule that defines
the traffic you want to encrypt, or create an IPSec rule to use for this VPN. If you
know the number of the IPSec rule, enter it in the box to the right. If you do not
know the number of the rule, click the ... button and browse for the rule. When
you select the rule, the number will appear in the box.
Note Because they can specify traffic type, and both source and destination, IPSec rules
are extended rules. If you enter the number or name of a standard rule, a Warning
message is displayed indicating that you have entered the name or number of a
standard rule.
Any packets that do not match the criteria in the IPSec rule are sent with no
encryption.
Summary of the Configuration
This window shows you the VPN or DMVPN configuration that you created. You
can review the configuration in this window and use the back button to make
changes if you want.
Spoke Configuration
If you have configured a DMVPN hub, you can have Cisco SDM generate a
procedure that will assist you or other administrators in configuring DMVPN
spokes. The procedure explains which options to select in the wizard, and what
information to enter in spoke configuration windows. You can save this
information to a text file that you or another administrator can use.