Thanks, Mike.
From: [email protected] [mailto:[email protected]] On Behalf Of Mike Rojas Sent: 05 May 2012 01:05 AM To: [email protected] Subject: [OSL | CCIE_Security] VPN and Dynamic Crypto maps Hi, For the people on the track and they havent run into this problem. Normally on the CCIE track most of the labs that I have run with are based on Virtual templates or static VTIs . However if by any chance you run into an issue where you have to configure VPNs using different crypto map instances, make sure that always put the dynamic crypto map with the highest (or at least higher) Sequence number than the static crypto maps. This is because phase 2 of the VPN is not gonna come up. You are going to be able to see that phase 1 is working fine, however phase 2 will not be functioning. The other side of the tunnel will be able to encrypt packets but on the device with the misconfiguration will not be able to create phase 2 and features like RRI are going to be broken. I has been a while since I didnt create an EZVPN with crypto maps and I had totally forgot about it. "If static and dynamic peers are configured on the same crypto map, the order of the crypto map entries is very important. The sequence number of the dynamic crypto map entry must be higher than all of the other static crypto map entries. If the static entries are numbered higher than the dynamic entry, connections with those peers fail." I wish It would have just failed all the way :(. http://www.cisco.com/en/US/tech/tk583/tk372/technologies_configuration_examp le09186a00801dddbb.shtml Mike
_______________________________________________ For more information regarding industry leading CCIE Lab training, please visit www.ipexpert.com Are you a CCNP or CCIE and looking for a job? Check out www.PlatinumPlacement.com
