08-14-2006 02:21 PM - edited 03-03-2019 04:30 AM
Can anyone tell me the main steps in creating ip sec tunnels , i.e create crypto map etc and applying access lists etc, thanks
08-14-2006 06:58 PM
There are lots of info. in CCO. Please check below for one of them.
http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_example09186a008009448f.shtml
http://www.cisco.com/en/US/tech/tk583/tk372/tech_configuration_examples_list.html
Hope this helps.
Find answers to your questions by entering keywords or phrases in the Search bar above. New here? Use these resources to familiarize yourself with the community: