The document describes the configuration of a site-to-site IPsec VPN tunnel between Router3 and a remote network with an address of 192.168.12.1. Key steps include:
1) Configuring Router3's tunnel interface with an IP address, source, destination, and IPsec protection profile.
2) Defining an IKE policy using pre-shared keys for authentication, AES-256 encryption, and SHA for hashing.
3) Creating an IPsec transform set and applying it to the crypto map.
4) Applying the crypto map to the tunnel interface to establish the encrypted VPN tunnel.
The document describes the configuration of a site-to-site IPsec VPN tunnel between Router3 and a remote network with an address of 192.168.12.1. Key steps include:
1) Configuring Router3's tunnel interface with an IP address, source, destination, and IPsec protection profile.
2) Defining an IKE policy using pre-shared keys for authentication, AES-256 encryption, and SHA for hashing.
3) Creating an IPsec transform set and applying it to the crypto map.
4) Applying the crypto map to the tunnel interface to establish the encrypted VPN tunnel.
The document describes the configuration of a site-to-site IPsec VPN tunnel between Router3 and a remote network with an address of 192.168.12.1. Key steps include:
1) Configuring Router3's tunnel interface with an IP address, source, destination, and IPsec protection profile.
2) Defining an IKE policy using pre-shared keys for authentication, AES-256 encryption, and SHA for hashing.
3) Creating an IPsec transform set and applying it to the crypto map.
4) Applying the crypto map to the tunnel interface to establish the encrypted VPN tunnel.