Which two statements are correct about IPsec crypto maps? (Choose two.)
- The crypto map defines the IPsec tunnel endpoint or peer.
- Packets that do not meet the criteria as specified in the crypto map are dropped.
- The crypto map is applied to the outbound interface that the router is peering with.
- A crypto map is used to negotiate and exchange authentication and encryption parameters with its peer.
- The crypto map is applied to the inbound interface that receives the packets before being transmitted over the VPN tunnel.
Exam with this question: CCNP ROUTE (Version 6.0) Chapter 7 Exam
Please login or Register to submit your answer