Jump to content

Crypto Map Flowchart ? How does a router/ASA processes a Crypto Map ?

Recommended Posts


Can anybody please explain the process of processing a crypto map on an interface ?

Crypto Map priortiy ? Flow of packet from Engine to interface and then processing of crypto map ?


I am trying to do S2S between R1 & R2 and Remote access between a client (connected to ISP) and R1,

and if the priority/line entry of Crypto Map (Remote Acess) is > Crypto Map (S2S) then VPNs stop working properly.


(e.g. for RA crypto map entry is at line 10 and for S2S crypto map entry is at 111)

Share this post

Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Create New...