• Post author:
  • Post category:Blog
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

Refer to the exhibit. A VPN tunnel is configured on the WAN between R1 and R2. On which R1 interface(s) would a crypto map be applied in order to create a VPN between R1 and R2?

Network Security (Version 1) - Network Security 1.0 Modules 18-19 VPNs Group Exam Answers 02
Network Security (Version 1) – Network Security 1.0 Modules 18-19 VPNs Group Exam Answers 02
  • G0/0
  • G0/0 and G0/1
  • S0/0/0
  • all R1 interfaces
    Answers Explanation & Hints:

    The crypto map command is used to finish creating the IPsec security policy by doing the followingbinding the interesting traffic ACL and transform set to the crypto map
    specifying the IP address of the remote VPN site
    configuring the Diffie-Hellman group
    configuring the IPsec tunnel lifetime
    The crypto map is bound to the S0/0/0 R1 interface.​

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments