When the CLI is used to configure an ISR for a site-to-site VPN connection, which two items must be specified to enable a crypto map policy? (Choose two.)
- the hash
- the peer
- encryption
- the ISAKMP policy
- a valid access list
- IP addresses on all active interfaces
Explanation: After the crypto map command in global configuration mode has been issued, the new crypto map will remain disabled until a peer and a valid access list have been configured.
Exam with this question: CCNA Security Chapter 10 Exam Answers
Exam with this question: Network Security Final Exam Answers
Please login or Register to submit your answer