Question: CISCO IPSEC QUESTIONS Question 1) Is the diffie-hellman bit length used in the configuration among the weakest or strongest possible? Question 2) What hashing algorithm

CISCO IPSEC QUESTIONS

Question 1)

CISCO IPSEC QUESTIONS Question 1) Is the diffie-hellman bit length used in

Is the diffie-hellman bit length used in the configuration among the weakest or strongest possible?

Question 2)

the configuration among the weakest or strongest possible? Question 2) What hashing

What hashing algorithm is being used to ensure data integrity?

Question 3)

algorithm is being used to ensure data integrity? Question 3) What hashing

What hashing algorithm would've been a better choice?

Question 4)

algorithm would've been a better choice? Question 4) How long will this

How long will this tunnel remain active (assuming this configuration has the lowest lifetime)?

crypto isakmp policy 2 authenticatin pre-share encr aes 128 hash md5 group .2 lifetime 21600 exit crypto isakmp key cisco123 address 23.0.0.1 crypto ipsec transform-set MY-SET esp-sha-hmac esp-aes 256 mode tunnel exit ip access-list extended SDM 1 permit ip 172.16.0.0 0.0.0.255 10.0.0.00.0.0.255 exit crypto map SDM CMAP 1 1 ipsec-isakmp match address SDM 1 set transform-set MY-SET set peer 23.0.0.1 exit interface gl/0 crypto map SDM CMAP 1 end

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!