IPsec (Internet Protocol Security)

Hello again Giovanni

The first setup that you mention in your post uses the IPSec Static Virtual Tunnel Interface. This is a simpler method of configuring a VPN with IPSec without using access lists. This is detailed more fully in the following lesson:

While the second set of commands involves the creation of an IPSec Tunnel Mode Configuration scenario. This is detailed in the following lesson:

Both essentially do the same thing, but the cyrpto ipsec profile command is the newer and preferred method of implementation.

I hope this has been helpful!

Laz

1 Like