Request any body to explain the parameters of Ipsec vpn
tunnel while creating a tunnel in Cisco ASA.

Answers were Sorted based on User's Feedback



Request any body to explain the parameters of Ipsec vpn tunnel while creating a tunnel in Cisco ASA..

Answer / jitendera sinha

In tunnel mode, the entire IP packet (data and IP header) is
encrypted and/or authenticated. It is then encapsulated into
a new IP packet with a new IP header. Tunnel mode is used to
create Virtual Private Networks for network-to-network
communications (e.g. between routers to link sites),
host-to-network communications (e.g. remote user access),
and host-to-host communications (e.g. private chat).

and the parameter are

Parameter Value
Name <Descriptive name for the tunnel>
VPN Policy <VPN policy that the tunnel should use>

This must match the policy on the other gateway
Local Endpoint <Local network entity that the tunnel
connects> This is usually a subnet entity.
Remote Endpoint <Remote network entity that the
tunnel connects> This is usually a subnet entity
Local Gateway <Local security gateway network entity>
Remote Gateway <Remote security gateway network entity>

i donot know more than that how ever plz tell me that.. is
that topic in the ccna course

Is This Answer Correct ?    1 Yes 0 No

Request any body to explain the parameters of Ipsec vpn tunnel while creating a tunnel in Cisco ASA..

Answer / sohaan

is the answer given by jitendera kumar sinha is correct?.plz
answer it.jitendera sinha provided lots of answer and i
think all are correct but rigt now he seems to confused

Is This Answer Correct ?    1 Yes 0 No

Request any body to explain the parameters of Ipsec vpn tunnel while creating a tunnel in Cisco ASA..

Answer / jitendera sinha

is there any one who can say that those answer is write or
not.
plz if not then provide the wright answer
by
nidhi mall

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

Which of the following are characteristics of UDP? A.) UDP is connection oriented. B.) UDP is used with TFTP. C.) UDP is unreliable. D.) UDP is connectionless. E.) UDP is at the transport layer. F.) UDP uses no acknowledgements.

2 Answers  


Identify the command to view the configuration-register value? A.) show register B.) display config-register C.) show config D.) show version

1 Answers  


what is difference between hub and switch?

7 Answers   IBM,


Can you give an overview of various components in IPSec?

0 Answers   CCIE,


Differentiate between broadcast domain and collision domain

0 Answers  






When we use interface mode?

0 Answers  


What command will not display the status of to1? A.) show int to1 B.) show to1 C.) show interface to1 D.) show interface

1 Answers  


Given the configuration example<HR> <B>interface ethernet0 ipx network 4a ipx access group 800 out interface ethernet1 ipx network 3d interface ethernet2 ipx network 5c access list 800 permit 3d 4a</B><HR> Which two actions result from implementing this configuration? (Choose two) A. IPX network 5c will not receive any traffic B. Traffic from network 3d for network 4a will be forwarded out e0 C. Traffic from network 4a for network 3d will be forwarded out e0 D. Traffic from network 3d destined for network 4a will be forwarded out e2 E. The access list is applied to an outgoing interface and filters outbound traffic

1 Answers  


What cable called v.35?

0 Answers  


Which network mask should you place on a Class C address to accommodate a user requirement of two subnetworks with a maxximum of 35 hosts on each networks A. 255.255.255.192 B. 255.255.255.224 C. 255.255.255.240 D. 255.255.255.248

4 Answers  


Identify 2 transport layer protocols? A.) IP B.) TCP C.) CDP D.) ARP E.) UDP

2 Answers  


what is router?

9 Answers   IBM,


Categories