---This command sets the ipsec transform set named 'to_vpn' (it can be any name you want). These transform sets are the encryption and hash types allowed for this tunnel; i.e. 3des, des, md5, etc. Thes transform-sets have to match on both sides of the tunnel---
crypto map to_vpn 10 ipsec-isakmp
---This command creats the crypto map 'to_vpn'it can be any name you choose. 10 is the map sequence number and ipsec-isakmp is the type of crypto map---
set peer a.b.c.d
---This is your set statement for the peer, you configure this with the IP address of your router at the other end of the tunnel---
set transform-set to_vpn
---This command sets the transform set to the above configured transform-set 'to_vpn'---
match address 100
--This is the map match statement that applies the above set statements to what matches the ACL created below---
ip address w.x.y.z 255.255.255.0
---IP address of your outside interface---
crypto map to_vpn
---This is your router external interface config. The 'crypto map to_vpn' statement applies the crypto map 'to_vpn' to the outside interface of your router---
access-list 100 remark LAN2LAN Match Address
access-list 100 permit ip w.x.y.z 0.0.0.255 a.b.c.d 0.0.255.255
---This is an ACL that the crypto map uses to match what addresses to 'tunnel'. This is an advanced ACL so it has to match source and destination---
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...