Refer to the exhibit. A VPN tunnel is configured on the WAN between R1 and R2. On which R1 interface(s) would a crypto map be applied in order to create a VPN between R1 and R2?

Last Updated on April 30, 2021 by Admin

Refer to the exhibit. A VPN tunnel is configured on the WAN between R1 and R2. On which R1 interface(s) would a crypto map be applied in order to create a VPN between R1 and R2?

Network Security (Version 1) - Network Security 1.0 Modules 18-19 VPNs Group Exam Answers 02
Network Security (Version 1) – Network Security 1.0 Modules 18-19 VPNs Group Exam Answers 02
  • G0/0
  • G0/0 and G0/1
  • S0/0/0
  • all R1 interfaces
    Answers Explanation & Hints:

    The crypto map command is used to finish creating the IPsec security policy by doing the followingbinding the interesting traffic ACL and transform set to the crypto map
    specifying the IP address of the remote VPN site
    configuring the Diffie-Hellman group
    configuring the IPsec tunnel lifetime
    The crypto map is bound to the S0/0/0 R1 interface.​

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments