Crypto Maps


Crypto maps are the glue that binds all your previous configurations together, including the IKE parameters. With a crypto map configuration, you tell the router whether you will be using IKE to automatically set up the IPSec tunnel for you or you will be configuring the IPSec tunnel manually.

A crypto map entry also identifies the crypto access list that will decide what traffic is protected. In addition to identifying what traffic is protected, the crypto map identifies which transform set will be used to protect the traffic.

Crypto maps specify the remote IPSec peer and can be used to override the global IPSec SA lifetimes.



CCSP SECUR Exam Cram 2
CCSP SECUR Exam Cram 2 (642-501)
ISBN: B000MU86IQ
EAN: N/A
Year: 2003
Pages: 291
Authors: Raman Sud

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net