04-21-2005 02:41 AM - edited 02-21-2020 12:05 AM
Can anyone provide some examples on how CERC can be used to create complex VPN scenario ?
Most of the time i just used the default CERC values and would like to know how do we make use of CERC to create complex VPN scenario.
Thanks
Eng Wee
04-27-2005 09:38 AM
Details of cerc topology related info is in this document : http://www.cisco.com/univercd/cc/td/doc/product/rtrmgmt/vpnsc/mpls/1_1/user_gd/vpn_ug1.htm
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide
Log in to Community