Skip to Main Content
Building Cisco Remote Access Networks
book

Building Cisco Remote Access Networks

by Wayne Lawson
November 2000
Intermediate to advanced content levelIntermediate to advanced
608 pages
16h 50m
English
Syngress
Content preview from Building Cisco Remote Access Networks
128 Chapter 4 • Utilizing VPN Technology for Remote Access Connectivity
Define a list specifying what needs to be encrypted. In this case you will
encrypt all communications between networks. If you wanted to only allow
and encrypt data between a single host on Corporate and a single host on
the Business partner network, you would define that here in this access list.
Access-list 100 permit ip 10.2.3.0 0.0.0.255 192.168.50.0 0.0.0.255
This states that anything passing the list should not have to use NAT.
This command does not get applied to any interface, but is associated with
the crypto map so that only traffic that is already encrypted uses this fea- ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cisco OSPF Command and Configuration Handbook

Cisco OSPF Command and Configuration Handbook

Ph.D. - CCIE #2969 William R. Parkhurst

Publisher Resources

ISBN: 9781928994138