Crypto Access Lists

Crypto access lists are a fancy name for extended IP access lists, for that is what crypto access lists are. With a crypto access list, you determine exactly what traffic gets IPSec protection by specifying source and destination IP addresses, port numbers, and the protocol. The protocol that you configure with the crypto access list can be IP, TCP, or UDP. Remember, IPSec only works with IP.

Crypto ACLs use extended IP ACLs only, and you can use both named and numbered IP ACLs.

Crypto ACLs are not applied to any interfaces. However, the crypto ACLs are still used to evaluate traffic flows both inbound to the router and outbound ...

Get SECUR Exam Cram™ 2 (Exam 642-501) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.