From: Olivier Martin (omartin@xxxxxxxx)
Date: Thu Sep 13 2001 - 16:00:50 GMT-3
That's pretty much it... If you run it through a virtual interface (e.g., a
tunnel), you have to apply it to both the virtual interface and the physical
interface (e.g, the tunnel0 and serial0/0 for example..)
Consider a case where 2 tunnels would leave from one router to 2 different
peers.. May be this would be a good hint.
Good luck,
Olivier
-----Message d'origine-----
De : Debashis Kundu [mailto:dkundu@cisco.com]
Envoyi : 13 septembre, 2001 13:13
@ : ccielab@groupstudy.com
Objet : IPsec/VPN
I am going through the topic related to IPSec. Is it sufficient or Do I
need to go through more VPN/IPSec stuff.
configure IKE:
Configure ISAKMP protection suite(s)
Configure ISAKMP key
configure IPSec:
Create extended ACL
Create IPSec transform(s)
Create crypto map
Apply crypto map to interface
**Please read:http://www.groupstudy.com/list/posting.html
**Please read:http://www.groupstudy.com/list/posting.html
This archive was generated by hypermail 2.1.4 : Thu Jun 13 2002 - 10:32:17 GMT-3