1.

What Are Crypto Map?

Answer»

Crypto map is used to pull together the various parts used to set up IPsec SAs including:-

  1. Which traffic should be protected by IPsec (crypto access list).
  2. Where IPsec-protected traffic should be sent (remote IPsec PEER).
  3. What IPsec SA should be applied to this traffic (transform SETS).

Multiple interfaces can share the same crypto map set in case we want to apply the same policy to multiple interfaces.

If more than one crypto map is CREATED for a given interface than use the sequence number of each map entry to rank the map entries, the lower the seq-num argument the HIGHER the priority.

Crypto map is used to pull together the various parts used to set up IPsec SAs including:-

Multiple interfaces can share the same crypto map set in case we want to apply the same policy to multiple interfaces.

If more than one crypto map is created for a given interface than use the sequence number of each map entry to rank the map entries, the lower the seq-num argument the higher the priority.



Discussion

No Comment Found