- Foundry Router User Guide

Security Features
June 2004 © 2004 Foundry Networks, Inc. 15 - 13
Step 8: Configure IPSec tunnel to the remote host:
NOTE: For IPSec only – when you create an outbound tunnel, an inbound tunnel is automatically created. The
inbound tunnel applies the name that you provide for the outbound tunnel and adds the prefix “IN” to the name.
Step 9: Display IPSec policies:
Router1/configure/crypto# ipsec policy Router2 172.16.0.2
Router1/configure/crypto/ipsec/policy Router2 172.16.0.2# match
address 10.0.1.0 24 10.0.2.0 24
Default proposal created with priority1-esp-3des-sha1-tunnel and
activated.
Router1/configure/crypto/ipsec/policy Router2 172.16.0.2# proposal 1
Router1/configure/crypto/ipsec/policy Router2 172.16.0.2/proposal 1#
encryption-algorithm aes256-cbc
Router1/configure/crypto/ipsec/policy Router2 172.16.0.2/proposal 1#
exit
Router1/configure/crypto/ipsec/policy Router2 172.16.0.2# exit
Router1# show crypto ipsec policy all
Policy Peer Match Proto Transform
------ ---- ----- ----- ---------
Router2 172.16.0.2 S 10.0.1.0/24/any Any P1 esp-aes-
sha1-tunl