Загрузка страницы

Crypto Map vs IPsec Profile

Get 30% off ITprotv.com with: You can use promo code: OSCAROGANDO2
Follow Me on Twitter:
https://twitter.com/CCNADailyTIPS

The same goes if you use ipsec profile, where you need to specify: how to protect traffic (transform-set); what to protect no longer requires an ACL,
it's just based on routing cause IPsec profile is always applied to a GRE/VTI interface, thus you have a logical interface associated with the IPsec tunnel; the remote VPN peer is no longer specified as it is one and the same as the GRE/VTI tunnel destination (it can be statically configured or dynamically learned).
Crypto-map and crypto ipsec profile are one and the same, it is the legacy way (map) and new way (profile) of configuring IKE Phase2.
In crypto-map you need to specify: how to protect traffic (transform-set); what to protect (ACL) and what is the remote VPN peer.

Видео Crypto Map vs IPsec Profile канала CCNADailyTIPS
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
22 августа 2019 г. 6:26:46
00:13:29
Яндекс.Метрика