
Configuring IP Security Services
3-8
304111-A Rev 00
The corresponding policy actions are:
•Drop
• Bypass
• Protect
• Log (a message will be written to the router log)
The first three actions are mutually exclusive. You can specify a logging action for
any of the other three actions. Note that if an incoming packet that does not match
any configured policy arrives at an IPsec interface, it is dropped by default.
Policy Considerations
When you configure a WAN interface with IPsec, all inbound and outbound traffic
on that interface is processed by IPsec, including traffic being forwarded.
For unicast traffic containing routing or control information, consider configuring
policies that allow such traffic to bypass IPsec. For example, to allow ICMP traffic
(such as “ping” or “destination unreachable” messages) to bypass IPsec
processing, configure the first policy for the interface with the protocol criterion
set to number 1 (ICMP) and the action specification set to bypass.
If a data packet matches the criteria for more than one policy, the first matching
policy is used.
Komentarze do niniejszej Instrukcji