Refer to the exhibit. The ISAKMP policy for the IKE Phase 1 tunnel was configured, but the tunnel does not yet exist. Which action should be taken next before IKE Phase 1 negotiations can begin?

IT Questions BankCategory: CCNA SecurityRefer to the exhibit. The ISAKMP policy for the IKE Phase 1 tunnel was configured, but the tunnel does not yet exist. Which action should be taken next before IKE Phase 1 negotiations can begin?

Refer to the exhibit. The ISAKMP policy for the IKE Phase 1 tunnel was configured, but the tunnel does not yet exist. Which action should be taken next before IKE Phase 1 negotiations can begin?

  • Configure the set of encryption and hashing algorithms that will be used to transform the data sent through the IPsec tunnel.
  • Bind the transform set with the rest of the IPsec policy in a crypto map​.
  • Configure the IPsec tunnel lifetime​.
  • Configure an ACL to define interesting traffic.

Explanation: Although the ISAKMP policy for the IKE Phase 1 tunnel is configured, the tunnel does not yet exist as verified with the show crypto isakmp sa command. Interesting traffic must be detected before IKE Phase 1 negotiations can begin. To define interesting traffic, each router has to be configured with an ACL to permit traffic from the local LAN to the remote LAN.​

Exam with this question: CCNA Security Practice Final Exam Answers
Exam with this question: Module 19: Quiz – Implement Site-to-Site IPsec VPNs Network Security

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments