Applying the Crypto Map to an Interface
After the crypto map has been configured, it must be applied to an interface
for it to take effect. It is applied at the outgoing interface—the one that VPN
traffic will use to reach the other end of the VPN. You might need to use a
static route or otherwise adjust your routing to force traffic bound for the
VPN destination networks to use the correct outgoing interface.
The following example shows the crypto map TO_SERVERS applied to
interface serial 0/0/0. Note that the router replies with a message that
ISAKMP is now enabled:
IPSEC_RTR(config)#int s0/0/0
IPSEC_RTR(config-if)#crypto map TO_SERVERS
IPSEC_RTR(config-if)#
01:19:16: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is ON