04-08-2004 12:06 AM - edited 02-21-2020 01:06 PM
I had understood that the CRYPTO MAP MATCH ADDRESS command linked with the ACL identifies the traffic to be encrypted, however we have a new client with and exisiting operational VPN configuration that does not have the MATCH ADDRESS argument viz:
crypto ipsec transform-set myset esp-des esp-md5-hmac
crypto dynamic-map cisco 30 set transform-set myset
crypto map myname 30 ipsec-isakmp dynamic cisco
crypto map myname interface outside
Can anyone give me a clue how this works please? The system is a PIX515E running 6.1.(1).
Solved! Go to Solution.
04-08-2004 04:28 AM
The crypto dynamic-map is part of the Easy VPN setup.
Read the description for the crypto dynamic-map command from the command reference below.
An example of the configuration is show on the link below.
Hope these help clear things up.
Steve
04-08-2004 04:28 AM
The crypto dynamic-map is part of the Easy VPN setup.
Read the description for the crypto dynamic-map command from the command reference below.
An example of the configuration is show on the link below.
Hope these help clear things up.
Steve
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide