ISAKMP
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Configuring IPsec<br />
Chapter 29<br />
Configuring IPsec and <strong>ISAKMP</strong><br />
Figure 29-2 shows the cascading ACLs created from the conceptual ACEs above. The meaning of each<br />
symbol in the figure follows.<br />
Crypto map within a crypto map set.<br />
(Gap in a straight line) Exit from a crypto map when a packet<br />
matches an ACE.<br />
Packet that fits the description of one ACE. Each size ball<br />
represents a different packet matching the respective ACE in the<br />
figure. The differences in size merely represent differences in the<br />
source and destination of each packet.<br />
Redirection to the next crypto map in the crypto map set.<br />
Response when a packet either matches an ACE or fails to match<br />
all of the permit ACEs in a crypto map set.<br />
29-16<br />
Cisco Security Appliance Command Line Configuration Guide<br />
OL-12172-04