There are several steps required to get IPSec up and running on an IOS-based Cisco router:
Define interesting traffic.
Define IKE Phase 1.
Define IKE Phase 2.
End the IPSec session.
To trigger IPSec to begin working, we define interesting traffic. What we mean by interesting traffic is traffic that is worthy to be encrypted and secured with IPSec. You define this interesting traffic using something called a crypto access list. Don't let this expression scare you because a crypto access list is nothing more than an access list. But this access list does not filter anything. For example, we might want all traffic encrypted from the 10 network to the ...