You could also use virtual tunnel interfaces, which eliminates the need for
crypto maps
http://www.cisco.com/en/US/docs/ios/12_3t/12_3t14/feature/guide/gtIPSctm.html
Jesse Wiener
On Feb 19, 2011, at 3:43 PM, Fabian Pucciarelli wrote:
> see if this helps.
>
>
http://blog.ipexpert.com/2010/09/20/vrf-aware-ipsec-using-crypto-maps/#more-4
955
>
>
<http://blog.ipexpert.com/2010/09/20/vrf-aware-ipsec-using-crypto-maps/#more-
4955>
> F
>
>
> Blogs and organic groups at http://www.ccie.net
>
> _______________________________________________________________________
> Subscription information may be found at:
> http://www.groupstudy.com/list/CCIELab.html
Blogs and organic groups at http://www.ccie.net
Received on Tue Feb 22 2011 - 08:13:18 ART
This archive was generated by hypermail 2.2.0 : Tue Mar 01 2011 - 07:01:50 ART