A network analyst is configuring a crypto map and has just bound the ACL and the transform set to the map, and set the IPsec tunnel lifetime. What other step completes the configuration of the crypto map?

IT Questions BankCategory: CCNA SecurityA network analyst is configuring a crypto map and has just bound the ACL and the transform set to the map, and set the IPsec tunnel lifetime. What other step completes the configuration of the crypto map?

A network analyst is configuring a crypto map and has just bound the ACL and the transform set to the map, and set the IPsec tunnel lifetime. What other step completes the configuration of the crypto map?

  • Define the interesting traffic.
  • Configure the DH group.
  • Apply the map to an interface.
  • Configure the SA policy.

Explanation: To configure a crypto map, four steps need to be completed.

  • Bind the ACL and the transform set to the map.
  • Specify the peer’s IP address.
  • Configure the DH group.
  • Configure the IPsec tunnel lifetime.

Exam with this question: Module 19: Quiz – Implement Site-to-Site IPsec VPNs Network Security

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments