- Define the encryption algorithms that the router can negotiate to use for the session in crypto map configuration mode.
- Assign one access list to each crypto map sequence.
- Assign the crypto map to a router interface.
This completes step 5 and configuration is complete.
|