Question: CISCO IPSEC QUESTIONS Question 9) What encryption algorithm is being used for the ike phase 2 user tunnel? . . . . . Question 10)
CISCO IPSEC QUESTIONS
Question 9)

What encryption algorithm is being used for the ike phase 2 user tunnel?
.
.
.
.
.
Question 10)

What passkey is being used for authentication?
.
.
.
.
.
Question 11)

Is the crypto map applied to the incoming or outgoing interface?
.
.
.
.
.
Question 12)

What number is being used to identify ike phase 1 configuration properties?
crypto isakmp policy 2 authenticatin pre-share encr aes 128 hash md5 group .2 lifetime 21600 exit crypto isakmp key cisco123 address 23.0.0.1 crypto ipsec transform-set MY-SET esp-sha-hmac esp-aes 256 mode tunnel exit ip access-list extended SDM 1 permit ip 172.16.0.0 0.0.0.255 10.0.0.00.0.0.255 exit crypto map SDM CMAP 1 1 ipsec-isakmp match address SDM 1 set transform-set MY-SET set peer 23.0.0.1 exit interface gl/0 crypto map SDM CMAP 1 end
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
