set ike version
To determine IKE’s version, use the set ike version command in Crypto Map Configuration Mode.
crypto policy encryption
To configures Phase 1 encryption for the IKE policy, hash, DH group, mode and lifetime configuration, use the isakmp policy command in Crypto Map Configuration Mode.
crypto key
To specify the type of algorithm to be used for decryption / encryption or define VPN mode-related configuration, use the crypto key command in Crypto Map Configuration Mode.
crypto map ipsec
To define IPSec Phase II Proposal providing encryption and determining authentication algorithm, mode of transaction, and lifetime as parameters, use the crypto map ipsec command in Crypto Map Configuration Mode.
crypto ipsec mode
To determine the type of encryption mode, use the crypto ipsec mode command in Crypto Map Configuration Mode. IPSec supports two encryption modes: transport and tunnel.
access-list
To create an access list which determines source and destination IP networks for which security services need to be applied or to specify protocol, use the access-list command in Crypto Map Configuration Mode.
debug crypto ipsec level
To debug the VPN, use the debug crypto ipsec level command in User Exec. The no form of the command disables the debugging changing default logging level to 1. and changes default logging level to 1.
set ipv6 peer
To peer related configuration, use the set ipv6 peer command in Crypto Map Configuration Mode.
set local
To local end point configuration, use the set local command in Crypto Map Configuration Mode.
set peer
To determine local end point configuration, use the set peer command in Crypto Map Configuration Mode.