Crypto Map Flowchart ? How does a router/ASA processes a Crypto Map ?
Can anybody please explain the process of processing a crypto map on an interface ?
Crypto Map priortiy ? Flow of packet from Engine to interface and then processing of crypto map ?
I am trying to do S2S between R1 & R2 and Remote access between a client (connected to ISP) and R1,
and if the priority/line entry of Crypto Map (Remote Acess) is > Crypto Map (S2S) then VPNs stop working properly.
(e.g. for RA crypto map entry is at line 10 and for S2S crypto map entry is at 111)