Hi,
On Sat, Nov 28, 2009 at 3:52 AM, olumayokun fowowe <olumayokun_at_gmail.com> wrote:
> Find below the config for both ends. The access-lists at both ends match.
[... snip ...]
Is there a good reason you're not using "tunnel protection ipsec
[...]", instead of crypto maps?
It's a much 'cleaner' way to achieve what you seem to be trying to
achieve (GRE/IPSec).
cheers,
Dale
Blogs and organic groups at http://www.ccie.net
Received on Sat Nov 28 2009 - 07:49:06 ART
This archive was generated by hypermail 2.2.0 : Tue Dec 01 2009 - 06:36:29 ART