Question: CISCO IPSEC QUESTIONS Question 1) Is the diffie-hellman bit length used in the configuration among the weakest or strongest possible? Question 2) What hashing algorithm
CISCO IPSEC QUESTIONS
Question 1)

Is the diffie-hellman bit length used in the configuration among the weakest or strongest possible?
Question 2)

What hashing algorithm is being used to ensure data integrity?
Question 3)

What hashing algorithm would've been a better choice?
Question 4)

How long will this tunnel remain active (assuming this configuration has the lowest lifetime)?
crypto isakmp policy 2 authenticatin pre-share encr aes 128 hash md5 group .2 lifetime 21600 exit crypto isakmp key cisco123 address 23.0.0.1 crypto ipsec transform-set MY-SET esp-sha-hmac esp-aes 256 mode tunnel exit ip access-list extended SDM 1 permit ip 172.16.0.0 0.0.0.255 10.0.0.00.0.0.255 exit crypto map SDM CMAP 1 1 ipsec-isakmp match address SDM 1 set transform-set MY-SET set peer 23.0.0.1 exit interface gl/0 crypto map SDM CMAP 1 end
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
