
118 Chapter 4 • Utilizing VPN Technology for Remote Access Connectivity
Peer The “other side,” or the other router that will be doing encryption. It
takes at least two encryption devices to make a VPN, and each one is the
peer of the other.
Transform-Set Used to define the IPSec protocols you want to use for
authentication and/or encryption.
Crypto Map Used to tie together configurations such as the transform set,
the peer, and the data to be encrypted.
Dynamic Crypto Map A crypto map before some of the information is
provided by the remote peer.
ISAKMP (Internet Security Association and Key Management Protocol)
Framework providing a means for policy negotiations ...