User manual

Motorola RF Switch CLI Reference Guide
5-36
wired LAN in the branch office to bridge directly to the central site while maintaining full
security.
This example requires two switches. It can be configured with the following commands:
1. Configuration required on switch 1:
a.Create an extended ACL. This is used to define the tunnel used by the traffic.
RFSwitch(config)#access-list 150 permit ip 12.1.1.0/24
13.1.1.0/24 rule-precedence
b.Create and configure ISAKMP parameters.
RFSwitch(config)#crypto isakmp keepalive 10
RFSwitch(config)#crypto isakmp key SYMBOLAD address
15.1.1.20
RFSwitch(config)#crypto ipsec security-association lifetime
kilobytes 4608000
c.Create and configure ISAKMP policy.
RFSwitch(config)#crypto isakmp policy 199
RFSwitch(config-crypto-isakmp)#encryption aes
RFSwitch(config-crypto-isakmp)#hash sha
RFSwitch(config-crypto-isakmp)#authentication pre-share
RFSwitch(config-crypto-isakmp)#group 5
RFSwitch(config-crypto-isakmp)#lifetime 9496
d.Create and configure an IPSec transform set.
RFSwitch(config)#crypto ipsec transform-set TFSET ah-sha-
hmac esp-aes