Compare cert salaries and plan your next career move
lildeezul wrote: » Cisco Blog: VPN Virtual Tunnel Interfaces i was reading up on that article, and i acutally i actually liked the profile... basically is the same as the crypto map but with less commands, such as set peer, and match address. also i noticed, tunnel mode ipsec ipv4.. and not GRE ip. man... this stuff is amazing, i love doing this stuff... i got my memory in yesterday, and i am still doing some xmodem IOS uploads, i have like 2 routers left, and then i can lab up this material....:D Also.. i was wondering when that article did the ipsec profile, he didnt create an extended access list to define interesting traffic ?? why is that, will everything that sent over the link be secure ? what if you dont want some subnets to utilize the secure channel of ipsec. how would you go about this ?
dtlokee wrote: » Few things: 1. You can use GRE or IP in IP, GRE will need to add an additional header that will lead to additional overhead vs IP in IP 2. You don't need an ACL because it is assumed that all traffic traversing the tunnel will be encrypted. This is the same as it would be if you used a crypto map and ACL that matched the GRE packets (because the ACL doesn't see the inner header only the outer one. If you want to restrict traffic from traversing the tunnel, use an ACL on the tunnel interface itself. 3. If you want some traffic to be encrypted and some not to be encrypted when useing tunnels you would need to create 2 tunnels and manipulate routing tables or policy route the traffic. I don't think this is really the best way if you are using a public network I would encrypt all of the traffic.
Compare salaries for top cybersecurity certifications. Free download for TechExams community.