1. Define the encryption algorithms that the router can negotiate to use for the session in crypto map configuration mode.
  2. Assign one access list to each crypto map sequence.
  3. Assign the crypto map to a router interface.

This completes step 5 and configuration is complete.