![]() ![]() The crypto ACL defines source IP networks that can talk to destination IP networks. In Cisco parlance, the most common way to specify allowed traffic is to use a crypto access list (ACL). What traffic will be allowed to flow through the tunnel? (What will we talk about?).The two endpoints must also agree on how traffic will be encrypted by using a common set of ciphers. Most often, the answer is a pre-shared key - a password - or a certificate exchange. How will the tunnels be authenticated? (How will we trust each other?). ![]() One firewall administrator configures the other’s IP address as a peer IP. The answer is usually a pair of single IP addresses.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |