Slide 29
Slide 29 text
Crypto map based site-to-site VPN
• Also called policy-based VPN
• Traffic is encrypted based on policy:
• The packet is routed according to the routing table
• If outgoing interface has crypto map applied, check crypto ACL from top to
bottom
• If there is a match in crypto ACL, build IPsec tunnel to the peer defined in the
crypto map and encrypt the traffic
• Return traffic that comes to an interface with crypto map is matched against
Security Policy Database (SPD) to check if it should be decrypted
• Considered to be legacy, because requires careful selection of Proxy
ACL
• Not as flexible as route-based VPN
29