Hiya Experts,
I'm wondering what's the difference between adding crypto-map onto
1) WAN interface
2) LAN interface
3) Tunnel interface
OR
4) adding the "tunnel protection" command onto the tunnel interface itself
I notice that with option 1,2 and obviously 4 I'm unable to define
interesting traffic from my host to destination loopback address.
Cheers.
Blogs and organic groups at http://www.ccie.net
Received on Tue May 31 2011 - 20:14:12 ART
This archive was generated by hypermail 2.2.0 : Fri Jul 01 2011 - 06:24:27 ART