Recent Comments
No comments to show.
Author Archives: admin
IPSec based on crypto map
The configuration of IPSec can be accomplished through the following six steps: Configuration crypto isakmp policy Configuration password for peer Configuration transform-set Configuration crypto map Configuration interface Configuration ACL Below I will provide an example configuration for each step: Configuration … Continue reading
Posted in Uncategorized
Leave a comment