Hi Jerry I have done that already. Either you can use ISAKMP profiles or the one that you have mentioned which is basically AAA integrated (local also is possible). Using "crypto isakmp peer" is easy. But I guess, only the ISAKMP profiles will be tested in the lab.
With regards Kings On Fri, Sep 23, 2011 at 5:05 AM, Jim Terry <[email protected]> wrote: > Hi Kings, > > Just curious as to why you used your approach and not this one: > > Step 2 > Router(config)# crypto isakmp peer {ip-address ip-address | fqdn fqdn} > Enables an IPSec peer for IKE querying of AAA for tunnel attributes > in aggressive mode and enters ISAKMP policy configuration mode. > > Step 3 > Router(config-isakmp)# set aggressive-mode client-endpoint client-endpoint > Specifies the Tunnel-Client-Endpoint attribute within an ISAKMP peer > configuration. > > Step 4 > Router(config-isakmp)# set aggressive-mode password password > Specifies the Tunnel-Password attribute within an ISAKMP peer > configuration. > > > http://www.cisco.com/en/US/docs/ios/sec_secure_connectivity/configuration/guide/sec_ike_12_2_8_ps6441_TSD_Products_Configuration_Guide_Chapter.html > Is their a difference between the two? > > JT > > > On Thu, Sep 22, 2011 at 1:04 PM, Diego Cambronero > <[email protected]> wrote: > > Crypto isak iden hostname in the peer ? > > > > > > > > El 22/09/2011, a las 10:28 a.m., Piotr Matusiak <[email protected]> > escribió: > > > > Hi Kings, > > > > what about > > > > ip host router3.king.com 10.20.30.40 > > > > ?? > > > > Regards, > > Piotr > > > > > > > > > > > > 2011/9/22 Kingsley Charles <[email protected]> > >> > >> Hi all > >> > >> Is it an issue in IOS or a silly mistake from my side? The following > >> configuration doesn't work for me. > >> > >> > >> crypto isakmp key cisco hostname router3.king.com > >> crypto isakmp profile prof > >> keyring default > >> self-identity fqdn > >> match identity host router3.king.com > >> initiate mode aggressive > >> ! > >> crypto ipsec transform-set tran esp-3des esp-sha-hmac > >> ! > >> crypto map cisco 1 ipsec-isakmp > >> set peer 10.20.30.40 > >> set transform-set tran > >> set isakmp-profile prof > >> match address 123 > >> reverse-route static > >> > >> > >> With regards > >> Kings > >> > >> _______________________________________________ > >> For more information regarding industry leading CCIE Lab training, > please > >> visit www.ipexpert.com > >> > >> Are you a CCNP or CCIE and looking for a job? Check out > >> www.PlatinumPlacement.com > > > > _______________________________________________ > > For more information regarding industry leading CCIE Lab training, please > > visit www.ipexpert.com > > > > Are you a CCNP or CCIE and looking for a job? Check out > > www.PlatinumPlacement.com > > > > _______________________________________________ > > For more information regarding industry leading CCIE Lab training, please > > visit www.ipexpert.com > > > > Are you a CCNP or CCIE and looking for a job? Check out > > www.PlatinumPlacement.com > > > _______________________________________________ > For more information regarding industry leading CCIE Lab training, please > visit www.ipexpert.com > > Are you a CCNP or CCIE and looking for a job? Check out > www.PlatinumPlacement.com >
_______________________________________________ For more information regarding industry leading CCIE Lab training, please visit www.ipexpert.com Are you a CCNP or CCIE and looking for a job? Check out www.PlatinumPlacement.com
