A network analyst is configuring a site-to-site IPsec VPN. The analyst has configured both the ISAKMP and IPsec policies. What is the next step?

IT Questions BankCategory: CCNA SecurityA network analyst is configuring a site-to-site IPsec VPN. The analyst has configured both the ISAKMP and IPsec policies. What is the next step?
A network analyst is configuring a site-to-site IPsec VPN. The analyst has configured both the ISAKMP and IPsec policies. What is the next step? 1IT Administrator Staff asked 4 months ago

A network analyst is configuring a site-to-site IPsec VPN. The analyst has configured both the ISAKMP and IPsec policies. What is the next step?

  • Configure the hash as SHA and the authentication as pre-shared.
  • Apply the crypto map to the appropriate outbound interfaces.
  • Issue the show crypto ipsec sa command to verify the tunnel.
  • Verify that the security feature is enabled in the IOS.

More Questions: Network Security Final Exam Answers


Related Articles

guest
0 Comments
Inline Feedbacks
View all comments