Professional Documents
Culture Documents
After the initial connection is established, it can dynamically change connection information.
Configure the message encryption algorithm with the encryptiontype ISAKMP policy configuration command.
Configure the DH group identifier with the groupnumber ISAKMP policy configuration command.
Configure a hostname with the crypto isakmp identity hostname global configuration command.
Configure a PSK with the crypto isakmp key global configuration command.
MD5
SHA
pre-shared keys
encrypted nonces
digital certificates
tunnel mode
transport mode
authentication header
10.1.1.1
10.1.1.2
10.2.2.1
10.2.2.2
192.168.1.1
192.168.3.1
exchange of DH keys
Refer to the exhibit. A network administrator is troubleshooting a GRE VPN tunnel between R1 and R2. Assuming the R2 GRE
configuration is correct and based on the running configuration of R1, what must the administrator do to fix the problem?
It is compatible with DMVPNs, Cisco IOS Firewall, IPsec, IPS, Cisco Easy VPN, and NAT.
Refer to the exhibit. Under the ACL Editor, which option is used to specify the traffic to be encrypted on a secure connection?
Access Rules
IPsec Rules
Firewall Rules
400
500
600
700
MD5
SHA
RSA signatures
pre-shared keys
ESP header
ESP trailer
new IP header
original IP header
IPsec works at the application layer and protects all application data.
IPsec works at the transport layer and protects data at the network layer.
IPsec works at the network layer and operates over all Layer 2 protocols.
16
24
32
On-Demand Routing
Refer to the exhibit. Which two IPsec framework components are valid options when configuring an IPsec VPN on a Cisco ISR route
(Choose two.)
Refer to the exhibit. Based on the SDM screen, which Easy VPN Server component is being configured?
group policy
transform set
IKE proposal
user authentication