21.11.2013 Views

ISAKMP

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Configuring IPsec<br />

Chapter 29<br />

Configuring IPsec and <strong>ISAKMP</strong><br />

Figure 29-2 shows the cascading ACLs created from the conceptual ACEs above. The meaning of each<br />

symbol in the figure follows.<br />

Crypto map within a crypto map set.<br />

(Gap in a straight line) Exit from a crypto map when a packet<br />

matches an ACE.<br />

Packet that fits the description of one ACE. Each size ball<br />

represents a different packet matching the respective ACE in the<br />

figure. The differences in size merely represent differences in the<br />

source and destination of each packet.<br />

Redirection to the next crypto map in the crypto map set.<br />

Response when a packet either matches an ACE or fails to match<br />

all of the permit ACEs in a crypto map set.<br />

29-16<br />

Cisco Security Appliance Command Line Configuration Guide<br />

OL-12172-04

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!