Last Updated on April 30, 2021 by Admin
Refer to the exhibit. A VPN tunnel is configured on the WAN between R1 and R2. On which R1 interface(s) would a crypto map be applied in order to create a VPN between R1 and R2?
- G0/0 and G0/1
- all R1 interfaces
Answers Explanation & Hints:
The crypto map command is used to finish creating the IPsec security policy by doing the followingbinding the interesting traffic ACL and transform set to the crypto map
specifying the IP address of the remote VPN site
configuring the Diffie-Hellman group
configuring the IPsec tunnel lifetime
The crypto map is bound to the S0/0/0 R1 interface.