Question: CISCO IPSEC QUESTIONS Question 9) What encryption algorithm is being used for the ike phase 2 user tunnel? . . . . . Question 10)

CISCO IPSEC QUESTIONS

Question 9)

CISCO IPSEC QUESTIONS Question 9) What encryption algorithm is being used for

What encryption algorithm is being used for the ike phase 2 user tunnel?

.

.

.

.

.

Question 10)

the ike phase 2 user tunnel? . . . . . Question

What passkey is being used for authentication?

.

.

.

.

.

Question 11)

10) What passkey is being used for authentication? . . . .

Is the crypto map applied to the incoming or outgoing interface?

.

.

.

.

.

Question 12)

. Question 11) Is the crypto map applied to the incoming or

What number is being used to identify ike phase 1 configuration properties?

crypto isakmp policy 2 authenticatin pre-share encr aes 128 hash md5 group .2 lifetime 21600 exit crypto isakmp key cisco123 address 23.0.0.1 crypto ipsec transform-set MY-SET esp-sha-hmac esp-aes 256 mode tunnel exit ip access-list extended SDM 1 permit ip 172.16.0.0 0.0.0.255 10.0.0.00.0.0.255 exit crypto map SDM CMAP 1 1 ipsec-isakmp match address SDM 1 set transform-set MY-SET set peer 23.0.0.1 exit interface gl/0 crypto map SDM CMAP 1 end

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!