VPN TunnelVPN Home | How VPN Works | Type of VPN | Advantages of VPN | Disadvantages of VPN | SSL VPN | VPN Firewall | VPN Router | VPN Setup | VPN Tunnel
A VPN tunnel establishes a secure connection between two sites over the Internet. VPN Tunnel Policy
This information is defined in a crypto map entry. Crypto map entries with the same crypto map name- but different map sequence numbers, are grouped into a crypto map set, which is applied to the VPN interfaces on the relevant devices. All IP traffic passing through the interface is evaluated against the applied crypto map set. If a crypto map entry sees outbound IP traffic that should be protected and the crypto map specifies the use of IKE, a security association is negotiated with the remote peer according to the parameters included in the crypto map entry. When two peers try to establish a security association, they must each have at least one crypto map entry that is compatible with one of the other peer's crypto map entries. The following minimum criteria for two crypto map entries to be compatible,
Tunnel policies define the VPN connection between two peers. They specify which traffic will be secured and the authentication and encryption algorithms that will be used to secure the traffic. A tunnel policy's priority is indicated by its position in the list of policies (higher indicates higher priority). If a traffic flow matches the filter conditions in more than one tunnel policy, the policy with the highest priority is applied. You can change the order of the policies in the list according to the priority you want them to have.
Copyright ©2022 vpncolombia.com |