04-20-2011 08:47 PM - edited 02-21-2020 05:17 PM
Hello everyone,
I have been looking around and I can not find the " crypto isakmp policy " command on this Cisco Router 1941. I just wanted to setup a regular IPSEC Lan to Lan tunnel and surprise, the command is not there. Do I have the wrong IOS? I thought that a K9 image would do the trick.
Any suggestions are appreciated
This is what I get:
Router(config)#crypto ?
ca Certification authority
key Long term key operations
pki Public Key components
SHOW VER
Cisco IOS Software, C1900 Software (C1900-UNIVERSALK9-M), Version 15.0(1)M2, RELEASE SOFTWARE (fc2)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2010 by Cisco Systems, Inc.
Compiled Wed 10-Mar-10 22:27 by prod_rel_team
ROM: System Bootstrap, Version 15.0(1r)M6, RELEASE SOFTWARE (fc1)
Router uptime is 52 minutes
System returned to ROM by reload at 02:43:40 UTC Thu Apr 21 2011
System image file is "flash0:c1900-universalk9-mz.SPA.150-1.M2.bin"
Last reload type: Normal Reload
Last reload reason: Reload Command
This product contains cryptographic features ....
Cisco CISCO1941/K9 (revision 1.0) with 487424K/36864K bytes of memory.
Processor board ID FTX142281F4
2 Gigabit Ethernet interfaces
2 Serial(sync/async) interfaces
DRAM configuration is 64 bits wide with parity disabled.
255K bytes of non-volatile configuration memory.
254464K bytes of ATA System CompactFlash 0 (Read/Write)
License Info:
License UDI:
-------------------------------------------------
Device# PID SN
-------------------------------------------------
*0 CISCO1941/K9 FTX142281F4
Technology Package License Information for Module:'c1900'
----------------------------------------------------------------
Technology Technology-package Technology-package
Current Type Next reboot
-----------------------------------------------------------------
ipbase ipbasek9 Permanent ipbasek9
security None None None
data None None None
Configuration register is 0x2102
Solved! Go to Solution.