Select Page

IPsec VPN Crypto Map Based Overview

by | 3-May-2021 | Cisco, Security, VPN

Crypto Map Based IPsec Overview

  • “Legacy” method of IOS IPsec configuration
    • Still the most common method
  • Used to form on-demand IPsec tunnels
    • Session initiated only when interesting traffic detected
  • No dynamic routing support through tunnel
    • Not without addional encapsulation such as GRE

 

How Crypto Map works

  • Crypto map is a data-plane filter
    • Matching traffic triggers an ISAKMP session to start
  • Traffic is matched using ACLs
    • ACLs define Proxy IDs for IPsec Phase 2
    • Allows for granular control over VPN traffic using extended ACL

 

Applying Crypto Map

  • Crypto map apply to L3 outgoing interface
    • Only one crypto map per interface
  • One crypto map can apply to multiple interfaces
  • Tunnel source defaults to L3 outgoing interface
    • Can be changed using “crypto-map local-address”

 

Crypto map order of operations

  • Encryption applies after routing
    • Static routing may be required
  • Encryption applies after NAT
    • NAT exemption may be required

 

IOS includes default fallback policies

  • Default ISAKMP policies
    • Can be disabled using “no crypto isakmp default policy”
  • Default IPsec policies (Transform-set)
    • Can be disabled using “no crypto ipsec transform-set default”

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *