Request any body to explain the parameters of Ipsec vpn
tunnel while creating a tunnel in Cisco ASA.
Answers were Sorted based on User's Feedback
Answer / jitendera sinha
In tunnel mode, the entire IP packet (data and IP header) is
encrypted and/or authenticated. It is then encapsulated into
a new IP packet with a new IP header. Tunnel mode is used to
create Virtual Private Networks for network-to-network
communications (e.g. between routers to link sites),
host-to-network communications (e.g. remote user access),
and host-to-host communications (e.g. private chat).
and the parameter are
Parameter Value
Name <Descriptive name for the tunnel>
VPN Policy <VPN policy that the tunnel should use>
This must match the policy on the other gateway
Local Endpoint <Local network entity that the tunnel
connects> This is usually a subnet entity.
Remote Endpoint <Remote network entity that the
tunnel connects> This is usually a subnet entity
Local Gateway <Local security gateway network entity>
Remote Gateway <Remote security gateway network entity>
i donot know more than that how ever plz tell me that.. is
that topic in the ccna course
Is This Answer Correct ? | 1 Yes | 0 No |
Answer / sohaan
is the answer given by jitendera kumar sinha is correct?.plz
answer it.jitendera sinha provided lots of answer and i
think all are correct but rigt now he seems to confused
Is This Answer Correct ? | 1 Yes | 0 No |
Answer / jitendera sinha
is there any one who can say that those answer is write or
not.
plz if not then provide the wright answer
by
nidhi mall
Is This Answer Correct ? | 0 Yes | 0 No |
What is ospf? Describe it.
What is the difference between switch, routers, and hub?
How we ping ICMP a NIC with a correct IP address but with wrong MAC address Do all NIC's can run inpromiscuous mode
Which of the following describe SMTP? A.) Used for downloading files to the router. B.) Used for sending e-mail. C.) Uses TCP. D.) Uses UDP. E.) Uses port 25. F.) Used for managing IP devices.
Which command line option will determine what traffic is interesting enough to establish a dialup connection? A.) dialer map B.) dialer string C.) dialer in-band D.) dialer-list E.) dialer negotiation
Identify the command that forces the router to load into ROM mode upon a reload? A.) boot system rom B.) rom boot C.) boot system flash rom D.) boot router rom
You have typed "ping" 172.16.101.1 and get the following display: Type escape sequence to abort. Sending 5, 100-byte ICMP Echoes to 172.16.101.1, timeout is 2 seconds: .!!!! What does the "." signify? A. That one message timed out. B. That all messages were successful. C. That one message was successful. D. That one message completed in under the allotted timeframe.
What is the command to copy the IOS image to a TFTP server? A.) copy flash tftp B.) copy running-config tftp C.) copy ios tftp D.) copy startup-config tftp
what is difference between packet switching and circuit swtching
Referring to the commands shown, what command must next be used on the branch router prior to traffic being sent to the router?
What are four ways that Fast Ethernet compares to 10BaseT Ethernet? (Choose four) A. Fast Ethernet uses the same Maximum Transmission Unit (MTU) B. Fast Ethernet is based on an extension to the IEEE 802.3 specification C. Fast Ethernet uses the same Media Access Control (MAC) mechanisms D. Fast Ethernet preserves the frame format that is used by 10BaseT Ethernet E. Fast Ethernet errors a speed increase one hundred times that of the 10BaseT Ethernet
Given an IPX network with redundant paths, what command will configure load balancing? A.) ipx load-balance B.) ip maximum-paths 2 C.) ipx maximum-paths 2 D.) ipx load-share