crypto map
To create or modify a crypto map entry and enter the crypto map configuration mode, use the crypto map global configuration command. To delete a crypto map entry or set, use the no form of this command.
Syntax
crypto map <map-name> <index> ipsec-isakmp no crypto map <map-name> <index> ipsec-isakmp
| Command | Description | 
|---|---|
| map-name | Name that identifies the crypto map set | 
| index | Uniquely number assigned to a crypto map entry | 
This command puts you into the config-crypto-map command mode:
(config-crypto-map)# set peer <peer-ip>
(config-crypto-map)# set transform-set <set-name> 
(config-crypto-map)# set pfs {group1|group2|group5|same} 
(config-crypto-map)# set security-association lifetime seconds <#>
(config-crypto-map)# match address <acl-name>
(config-crypto-map)# set tunnel start-action-mode {active|triggered|passive}
                                            | Command | Description | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| set peer <peer-ip> | Specifies an IPSec peer (IP address in dotted-decimal notation or an FQDN) in a crypto map entry. | ||||||||||||
| set transform-set <set-name> | Specifies which transform sets can be used with the crypto map entry. The set-name will be compare with all transform-sets prefix | ||||||||||||
| set pfs <group1|group2| group5|same> | Specifies that IPSec should ask for PFS when requesting new SAs for this crypto map entry, or that IPSec requires PFS when receiving requests for new SAs: 
 
 
 
 | ||||||||||||
| set security-association lifetime seconds <#> | Specifies the lifetime of an IPSec SA. | ||||||||||||
| set tunnel start-action-mode {active|triggered|passive} | Specifies the IPSec tunnel establishment mode: 
 
 
 Using the trigger or passive mode prevents both peers from initiating the tunnel simultaneously. | ||||||||||||
| match address <acl-name> | Specifies an extended access list for a crypto map entry. Only the first entry in the access list will be considered. | 
Default
IPSec SA lifetime default is 28800 seconds.
Command Mode
crypto map defined in enabled configuration mode.
Example
This example demonstrates how to configure a crypto map:
(config data)# crypto map mymap 1 ipsec-isakmp
(config-crypto-map)# set peer 1.2.3.4
(config-crypto-map)# set transform-set myset
(config-crypto-map)# set security-association lifetime seconds 28000
(config-crypto-map)# match address 101
(config-crypto-map)# set tunnel start-action-mode triggered