Author Archives: admin

IPSec based on crypto map

The configuration of IPSec can be accomplished through the following six steps: Configuration crypto isakmp policy Configuration password for peer Configuration transform-set Configuration crypto map Configuration interface Configuration ACL Below I will provide an example configuration for each step: Configuration … Continue reading

Posted in Uncategorized | Leave a comment