Configuring IPSec

Configuring IPSec
Now that you have successfully configured IKE on your firewall, you are ready to configure
IPSec. Follow these steps:
Step 1 Create a crypto access list to define the traffic to protect.
Step 2 Configure a transform set that defines how the traffic is protected.
Step 3 Create a crypto map entry.
Step 4 Apply the crypto map set to an interface.