Cisco Systems 2.5 Network Router User Manual


  Open as PDF
of 1002
 
17-9
Cisco Router and Security Device Manager 2.5 User’s Guide
OL-4015-12
Chapter 17 IP Security
IPSec Policies
What Do You Want to Do? (Manual Configuration of Crypto Map Only)
Add or Edit Crypto Map: Protecting Traffic
You can configure the crypto map to protect all traffic (Crypto Map Wizard only)
or choose an IPSec rule to protect specified traffic.
Protect all traffic between the following subnets (Crypto Map Wizard Only)
Use this option to specify a single source subnet (a subnet on the LAN) whose
traffic you want to encrypt, and one destination subnet supported by the peer that
you specified in the Peers window. All traffic flowing between other source and
destination subnets will be sent unencrypted.
Source
Enter the address of the subnet whose outgoing traffic you want to protect, and
specify the subnet mask. You can either select a subnet mask from the list or type
in a custom mask. The subnet number and mask must be entered in dotted decimal
format. For more information, see IP Addresses and Subnet Masks.
All traffic from this source subnet that has a destination IP address on the
destination subnet will be encrypted.
If you want to: Do this:
Add a transform set to the Selected
Transform Sets box.
Select a transform set in the Available Transform Sets box,
and click the right-arrow button.
Remove a transform set from the
Selected Transform Sets box.
Select the transform set you want to remove, and click the
left-arrow button.
Change the preference order of the
selected transform sets.
Select a transform set, and click the up button or the down
button.
Add a transform set to the Available
Transform Sets list.
Click Add, and configure the transform set in the Add
Transform Set window.
Edit a transform set in the Available
Transform Sets list.
Click Edit, and configure the transform set in the Edit
Transform Set window.