<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Tunnel Interfaces and Crypto Maps in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/tunnel-interfaces-and-crypto-maps/m-p/1009275#M1010385</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tracey&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is now much more clear. I do not have much experience with Virtual Tunnel Interfaces and am not in a position to say whether they would work well with established crypto map tunnels or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Tue, 22 Apr 2008 16:46:56 GMT</pubDate>
    <dc:creator>Richard Burts</dc:creator>
    <dc:date>2008-04-22T16:46:56Z</dc:date>
    <item>
      <title>Tunnel Interfaces and Crypto Maps</title>
      <link>https://community.cisco.com/t5/network-security/tunnel-interfaces-and-crypto-maps/m-p/1009272#M1010382</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can any one tell me if Tunnel Interface VPN's can be used on a router already configured with Crypto Maps? &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many Thanks,&lt;/P&gt;&lt;P&gt;Tracey Hill&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 09:59:33 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tunnel-interfaces-and-crypto-maps/m-p/1009272#M1010382</guid>
      <dc:creator>technical</dc:creator>
      <dc:date>2020-02-21T09:59:33Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel Interfaces and Crypto Maps</title>
      <link>https://community.cisco.com/t5/network-security/tunnel-interfaces-and-crypto-maps/m-p/1009273#M1010383</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tracey&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am not clear what you are really asking here. What do you mean by a tunnel interface VPN?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If the router already has crypto maps are the maps for Remote Access VPNs or for Site to Site VPN?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;In general I believe that the answer is that a router can support multiple types of VPN connections including Site to Site and Remote Access and can support VPN connections to multiple remote locations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If this has not been an adequate answer to your question then please clarify the question so that we can do better.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Apr 2008 15:30:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tunnel-interfaces-and-crypto-maps/m-p/1009273#M1010383</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2008-04-22T15:30:32Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel Interfaces and Crypto Maps</title>
      <link>https://community.cisco.com/t5/network-security/tunnel-interfaces-and-crypto-maps/m-p/1009274#M1010384</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thank you for your quick reply.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry if I wasn't clear I would like to configure 'Virtal Tunnel Interfaces' on a router already configured with Crytpo Maps, these Crypto Maps are providing Site to Site VPN not Remote Access.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I just wanted to be clear that they would run together without a problem before I spend time on a new design.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Many Thanks,&lt;/P&gt;&lt;P&gt;Tracey.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Apr 2008 15:43:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tunnel-interfaces-and-crypto-maps/m-p/1009274#M1010384</guid>
      <dc:creator>technical</dc:creator>
      <dc:date>2008-04-22T15:43:29Z</dc:date>
    </item>
    <item>
      <title>Re: Tunnel Interfaces and Crypto Maps</title>
      <link>https://community.cisco.com/t5/network-security/tunnel-interfaces-and-crypto-maps/m-p/1009275#M1010385</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Tracey&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It is now much more clear. I do not have much experience with Virtual Tunnel Interfaces and am not in a position to say whether they would work well with established crypto map tunnels or not.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;HTH&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Rick&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 22 Apr 2008 16:46:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/tunnel-interfaces-and-crypto-maps/m-p/1009275#M1010385</guid>
      <dc:creator>Richard Burts</dc:creator>
      <dc:date>2008-04-22T16:46:56Z</dc:date>
    </item>
  </channel>
</rss>

