Re: Crypto Map Question [7:27909]

2001-12-02 Thread Jim Gillen
Hunt Dynamic crypto maps are used when we don't know ahead of time some of the parameters for the SA or IKE associations to be made. This would be the case if someone is ringing in from home and it is not a device (router, firewall) to device(router, firewall) situation where the parameters can b

RE: Crypto Map Question [7:27909]

2001-12-01 Thread Matthew Crane
OK it all depends on when you use dynamic crypto maps and the rule is that dynamic maps are used for remote users who need occasional access and for whom you do not have all the necessary information to create a staic crypto map, sich as IP address. So a. You always create dynamic crypto maps w