Today, I'm tired today, IPsec is really annoying.

xiaoxiao2021-03-06  78

FT, when you first learn CCNP, I feel that this piece is nothing, now I have to configure VPN with PIX. As a result, it was more important to find that the details were really much better. Here is what I took a long time, ft, really TMD trouble.

About encryption mapping item encryption map Specifies an IPSec policy.

Encrypted mapping items created for IPSec puts different parts together to establish IPSec security connections. include:

A traffic (for each encrypted access table) is protected by IPSec.

Where is the traffic protected by IPSec (who is who is the other party).

A local address used for IPSec traffic (see "The" Application Encryption Mapping Set "section of the Interface Application Encryption.

IPSec security (selected from one or more conversion set lists) for this traffic.

Security Contact is created by hand-building or by IKE. l Define other parameters required for IPSec SA.

转载请注明原文地址:https://www.9cbs.com/read-94039.html

New Post(0)