Implementing Internet Key Exchange Security Protocol on Cisco IOS XR Software
How to Implement IKE Security Protocol Configurations for IPSec Networks
SC-45
Cisco IOS XR System Security Configuration Guide
SUMMARY STEPS
1. configure
2. crypto isakmp identity {address | hostname}
3. host hostname address1 [address2...address8]
4. end
or
commit
DETAILED STEPS
Command or Action Purpose
Step 1
configure
Example:
RP/0/RP0/CPU0:router# configure
Enters global configuration mode.
Step 2
crypto isakmp identity {address | hostname}
Example:
RP/0/RP0/CPU0:router(config)# crypto isakmp
identity address
(At the local peer) Specifies the peer’s ISAKMP identity by
IP address or by hostname. See the crypto isakmp identity
command description for guidelines for when to use the IP
address and when to use the hostname.
Step 3
host
hostname address1
[
address2...address8
]
Example:
RP/0/RP0/CPU0:router(config)# host host1
10.0.0.5
(At all remote peers) Maps the peer’s hostname to its IP
addresses at all the remote peers.
• This command is used if the local peer’s ISAKMP
identity was specified using a hostname.
• This step might be unnecessary if the hostname or
address is already mapped in a DNS server.
Step 4
end
or
commit
Example:
RP/0/RP0/CPU0:router(config)# end
or
RP/0/RP0/CPU0:router(config)# commit
Saves configuration changes.
• When you issue the end command, the system prompts
you to commit changes:
Uncommitted changes found, commit them before
exiting(yes/no/cancel)?
[cancel]:
–
Entering yes saves configuration changes to the
running configuration file, exits the configuration
session, and returns the router to EXEC mode.
–
Entering no exits the configuration session and
returns the router to EXEC mode without
committing the configuration changes.
–
Entering cancel leaves the router in the current
configuration session without exiting or
committing the configuration changes.
• Use the commit command to save the configuration
changes to the running configuration file and remain
within the configuration session.