Router1# show crypto ipsec policy all, Policy peer match proto transform – Foundry Networks AR3202-CL User Manual

Page 238

Advertising
background image

Security Features

June 2004

© 2004 Foundry Networks, Inc.

15 - 13

Step 8: Configure IPSec tunnel to the remote host:

NOTE: For IPSec only – when you create an outbound tunnel, an inbound tunnel is automatically created. The
inbound tunnel applies the name that you provide for the outbound tunnel and adds the prefix “IN” to the name.

Step 9: Display IPSec policies:

Router1/configure/crypto# ipsec policy Router2 172.16.0.2

Router1/configure/crypto/ipsec/policy Router2 172.16.0.2# match

address 10.0.1.0 24 10.0.2.0 24

Default proposal created with priority1-esp-3des-sha1-tunnel and

activated.

Router1/configure/crypto/ipsec/policy Router2 172.16.0.2# proposal 1

Router1/configure/crypto/ipsec/policy Router2 172.16.0.2/proposal 1#

encryption-algorithm aes256-cbc

Router1/configure/crypto/ipsec/policy Router2 172.16.0.2/proposal 1#

exit

Router1/configure/crypto/ipsec/policy Router2 172.16.0.2# exit

Router1# show crypto ipsec policy all

Policy Peer Match Proto Transform

------ ---- ----- ----- ---------

Router2 172.16.0.2 S 10.0.1.0/24/any Any P1 esp-aes-

sha1-tunl

Advertising
This manual is related to the following products: