What could be the potential problem?
You are trying to set up a site-to-site IPsec tunnel between two Cisco ASA adaptive security appliances, but you are not able to pass traffic. You try to troubleshoot the issue by enabling debug crypto isakmp and see the following messages:
CiscoASA# debug crypto isakmp
[IKEv1]: Group = 209.165.200.231, IP = 209.165.200.231, Tunnel Rejected: Conflicting protocols specified by tunnel-group and group-policy
[IKEv1]: Group = 209.165.200.231, IP = 209.165.200.231, QM FSM error (P2 struct &0xb0cf31e8, mess id 0x97d965e5)!
[IKEv1]: Group = 209.165.200.231, IP = 209.165.200.231, Removing peer from correlator table failed, no match!
What could be the potential problem?
Which of these Cisco IOS features implements a simple packet filter?
Which of these Cisco IOS features implements a simple packet filter?
What will this configuration for an IDSM-2 module do?
What will this configuration for an IDSM-2 module do?
intrusion-detection module 6 management-port access-vlan 36
intrusion-detection module 6 data-port 1 capture
intrusion-detection module 6 data-port 1 capture allowed-vlan 1-10, 36, 124
!
vlan access-map IDSM-2 10
match ip address 150
action forward capture
vlan access-map IDSM-2 20
match ip address 151
action forward
!
vlan filter IDSM-2 vlan-list 1 -10, 36, 124
!
access-list 150 permit tcp any 10.1.1.0 0.0.0.255
access-list 151 permit ip any any
which three of these goals?
With proper Cisco Secure Desktop configuration, you can achieve which three of these goals? (Choose three.)
Which OSPF LSA type is generated by the ABR to describe a route to neighbors outside the area?
Which OSPF LSA type is generated by the ABR to describe a route to neighbors outside the area?
which three of these criteria?
If a BGP-enabled router receives multiple advertisements for the same route from multiple sources, the router selects only one path as the best path using which three of these criteria? (Choose three.)
which one?
All of these security technologies use Rivest, Shamir, and Adleman (RSA) except which one?
Which field can be modified using the signature action oeModify Packet option?
Which three of these Windows operating system services run automatically (are automatically started upon appli
Which three of these Windows operating system services run automatically (are automatically started upon appliance power up) on the Cisco Secure ACS Solution Engine? (Choose three.)
which of these?
A bogon list (a list of reserved or unassigned IP addresses) that is applied to an access control list (ACL) can be best described as which of these?