Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
Announcements

Welcome to Cisco Support Community. We would love to have your feedback.

For an introduction to the new site, click here. And see here for current known issues.

New Member

crypto map

Hi all, when doing an access list for encrypting traffic on a crypto map, what kind of access list do you use, and do you permit destination traffic to be encrypted or source ?

3 REPLIES

Re: crypto map

Carl,

Extended ACLs are used to define interesting traffic which needs to be encrypted.

access-list 101

hope this helps ...

New Member

Re: crypto map

do we just then apply this access list to the crypto map ?

New Member

Re: crypto map

Hi,

As you apply the Access-List in that Crypto Map, packet passing through will be Encrypted

110
Views
0
Helpful
3
Replies
CreatePlease login to create content