To configure a per-session encryption policy, Cisco first configures access lists to specify which hosts and packets will be encrypted. Next, crypto maps are configured to support defined encryption policies. Finally, Cisco applies the crypto maps to the interfaces on which encryption will take place. |