Hunt
Dynamic crypto maps are used when we don't know ahead of time some of the
parameters for the SA or IKE associations to be made. This would be the case
if someone is ringing in from home and it is not a device (router, firewall)
to device(router, firewall) situation where the parameters can b
OK it all depends on when you use dynamic crypto maps and the rule is that
dynamic maps are used for remote users who need occasional access and for
whom you do not have all the necessary information to create a staic crypto
map, sich as IP address.
So
a. You always create dynamic crypto maps w
2 matches
Mail list logo