its all depends on your connectivity... when you use normal connectivity and configuration you not need to define intresting traffice... you are using accesslist to allow intresting traffic when you have ISDN connectivity....
Instead of encrypting all the traffic going via an interface where the crypto map is applied and as a prequistie you need to mention the interesting traffic using the ACLs (mostly the local lan subnets of your locations between which you are creating the ipsec tunnel).
[toc:faq]The ProblemOn traditional switches whenever we have a trunk
interface we use the VLAN tag to demultiplex the VLANs. The switch needs
to determine which MAC Address table to look in for a forwarding
decision. To do this we require the switch to do...
[toc:faq]Introduction:Netdr is a tool available on a RSP720, Sup720 or
Sup32 that allows one to capture packets on the RP or SP inband. The
netdr command can be used to capture both Tx and Rx packets in the
software switching path. This is not a substitut...
IntroductionOSPF, being a link-state protocol, allows for every router
in the network to know of every link and OSPF speaker in the entire
network. From this picture each router independently runs the Shortest
Path First (SPF) algorithm to determine the b...