Heads Up :
The post you are writing will appear in a public forum. Please ensure all content is appropriate for public consumption. Review the employee guidelines for the community here.
Hi, 1) I understand that if ISAKMP identifies any NAT device, it encapsulate ESP in UDP-4500. If this NAT-T mechanism is designed to make IPsec compatible with NAT, why doesn't the transport mode work with NAT? 2) If the only difference between tunn...
Hi Friends,I've created a site to site VPN between cisco devices. VPN tunnels are coming up, but traffic is getting encryted only at side.Anyone any idea why it's?Output from local device:Router#show crypto isaCRPvtMUScingh01#show crypto isakmp sa | ...
Friends,Normal burst size defines the size of token bucket which is the amount of data that can be sent in a given time interval.Excess burst size defines the amount of data that can be sent if no tokens are available in bucket per time interval. Th...
Hi Friends,I was searching for an E1 card on Cisco1921, however I couldn't find out an exact replacment for HWIC-4T1/E1.The modules which I came across are, VWIC2-1MFT-T1/E1 and VWIC2-1MFT-G703Can anyone please let me know the differences between ...
Hi Friends,I've configured my router LAN interface with secondary IP address, with & without ip-helper address.Option (1)interface GigabitEthernet0/0 description *** To LAN *** ip address 192.212.32.1 255.255.255.128 secondary ip address 192.234.212....
Sorry to say, this answer is wrong. The traffic is from LAN to Management. Most of the time, the destination ports will be well-known ports and source ports will be random generated. Thank you.