Hi,
If you have traffic from a router which is included in an access list which is applied to a crypto map, does that traffic get put into the ipsec tunnel - or, do does the traffic which gets put into an ipsec tunnel have to be sourced from another router?
the situation that we're running into is that we need to troubleshoot an ipsec tunnel... and want to use pings from the router that is sourcing the ipsec tunnel. is this possible?
Thanks, Lisa g