
128 Chapter 4 • Utilizing VPN Technology for Remote Access Connectivity
Define a list specifying what needs to be encrypted. In this case you will
encrypt all communications between networks. If you wanted to only allow
and encrypt data between a single host on Corporate and a single host on
the Business partner network, you would define that here in this access list.
Access-list 100 permit ip 10.2.3.0 0.0.0.255 192.168.50.0 0.0.0.255
This states that anything passing the list should not have to use NAT.
This command does not get applied to any interface, but is associated with
the crypto map so that only traffic that is already encrypted uses this fea- ...