Crypto Maps - IPSec
Crypto Maps - IPSec
This chapter describes the various types of IPsec crypto maps supported under StarOS.
A crypto map is a software configuration entity that performs two primary functions:
• Selects data flows that need security processing.
• Defines the policy for these flows and the crypto peer to which that traffic needs to go.
A crypto map is applied to an interface. The concept of a crypto map was introduced in classic crypto but
was expanded for IPSec.
Important A match ip pool command in a crypto group is not supported within crypto maps on the ASR 5500.
Guidelines are provided for configuring the following types of crypto maps:
Important This section provides the minimum instruction set for configuring ISAKMP crypto maps on the system.
For more information on commands that configure additional parameters and options, refer to the Context
Configuration Mode Commands and Crypto Map ISAKMP Configuration Mode chapters in the Command
Line Interface Reference.
Step 1 Configure ISAKMP crypto map by applying the example configuration in Configuring ISAKMP Crypto Maps, on page
2.
Step 2 Verify your ISAKMP crypto map configuration by following the steps in Verifying the ISAKMP Crypto Map
Configuration, on page 2.
Step 3 Save your configuration to flash memory, an external memory device, and/or a network location using the Exec mode
command save configuration. For additional information on how to verify and save configuration files, refer to the
System Administration Guide and the Command Line Interface Reference.
This command produces an output similar to that displayed below that displays the configuration of a crypto
map named test_map2.
Map Name : test_map2
========================================
Payload :
crypto_acl2: permit tcp host 10.10.2.12 neq 35 any
Crypto map Type : ISAKMP
IKE Mode : MAIN
IKE pre-shared key : 3fd32rf09svc
Perfect Forward Secrecy : Group2
Hard Lifetime :
28800 seconds
4608000 kilobytes
Number of Transforms: 1
Transform : test1
AH : none
ESP: md5 3des-cbc
Encaps mode: TUNNEL
Local Gateway: Not Set
Remote Gateway: 192.168.1.1
Caution Modification(s) to an existing ISAKMP crypto map configuration will not take effect until the related
security association has been cleared. Refer to the clear crypto security-association command located
in the Exec Mode Commands chapter of the Command Line Interface Reference for more information.
Important This section provides the minimum instruction set for configuring dynamic crypto maps on the system.
For more information on commands that configure additional parameters and options, refer to the Context
Configuration Mode Commands and Crypto Map Dynamic Configuration Mode Commands chapters in
the Command Line Interface Reference.
Step 1 Configure dynamic crypto maps by applying the example configuration in Configuring Dynamic Crypto Maps, on page
4.
Step 2 Verify your dynamic crypto map configuration by following the steps in Verifying the Dynamic Crypto Map
Configuration, on page 4.
Step 3 Save your configuration to flash memory, an external memory device, and/or a network location using the Exec mode
command save configuration. For additional information on how to verify and save configuration files, refer to the
System Administration Guide and the Command Line Interface Reference.
Caution Modification(s) to an existing dynamic crypto map configuration will not take effect until the related
security association has been cleared. Refer to the clear crypto security-association command located
in the Exec Mode Commands chapter of the Command Line Interface Reference for more information.
Configuration Mode Commands and Crypto Map Manual Configuration Mode Commands chapters in the
Command Line Interface Reference.
To configure the manual crypto maps for IPSec:
Step 1 Configure manual crypto map by applying the example configuration in Configuring Manual Crypto Maps, on page
5.
Step 2 Verify your manual crypto map configuration by following the steps in Verifying the Manual Crypto Map Configuration,
on page 6.
Step 3 Save your configuration to flash memory, an external memory device, and/or a network location using the Exec mode
command save configuration. For additional information on how to verify and save configuration files, refer to the
System Administration Guide and the Command Line Interface Reference.
Important Because manual crypto map configurations require the use of static security keys (associations), they are
not as secure as crypto maps that rely on dynamically configured keys. Therefore, it is recommended that
they only be configured and used for testing purposes.
Caution Modification(s) to an existing manual crypto map configuration will not take effect until the related security
association has been cleared. Refer to the clear crypto security-association command located in the Exec
Mode Commands chapter of the Command Line Interface Reference for more information.
Important This section provides the minimum instruction set for applying manual or ISAKMP crypto maps to an
interface on the system. For more information on commands that configure additional parameters and
options, refer to the Command Line Interface Reference.