Going through all those steps and creating a new crypto map will not work.
Depending on the requirements of the second destination it is likely that the same ISAKMP policy and same IPSEC transform set can be used for both connections. (or if the second destination requires a different ISAKMP policy or requires a different transform set, then you would configure additional ones as required).
You would need to configure an additional crypto ACL and you would apply that ACL in the second instance of the crypto map.
You do not create a separate crypto map but you create another instance (another destination - as I show in my previous response). And since it is the same crypto map there is no change in configuration of the serial interface. (and if you experiment with it you will find that the serial interface can have only 1 crypto map applied to it)
There may be changes in the firewall configuration to permit this new destination.
Yes it is possible to have multiple site to site tunnels and all use the same serial interface for the outbound connection. To accomplish this you would configure a single crypto map with multiple instances. It might look something like this:
crypto map testmap 10 ipsec-isakmp set peer x.x.x.x
other set statements
crypto map testmap 20 ipsec-isakmp set peer y.y.y.y
This document gives several answers on frequently asked questions for PFRv3 channel state behavior.
Q1: What are all the channel operational states from a BR (border role) perspective and what are the rules/conditions to be in each st...
The need was to reach an host inside a LAN through a VPN connection managed by the LAN gateway (Cisco 1921).
The LAN gateway performs NAT and there was a dedicate nat rule for the host i wanted to reach through VPN.
I couldn't connect to the hos...
We have 3 identical switches configured by someone else and would like to claim some of the Gigabit ports(G1/G2/G3/G4) for use on servers. When we try to change the wiring and configuration, we run in to connectivity issues. Attached is a des...