C. It configures a crypto policy with a key size of 14400.
D. It configures IPSec Phase 2.
2 Comments on “What is the effect of the given command sequence?”
Marcelsays:
A:
ISAKMP is the negotiation protocol that lets two hosts agree on how to build an IPsec security
association (SA). ISAKMP separates negotiation into Phase 1 and Phase 2. Phase 1 creates the first tunnel, which protects later ISAKMP negotiation messages. Phase 2 creates the tunnel that protects data.
IKE uses ISAKMP to setup the SA for IPsec to use. IKE creates the cryptographic keys used to authenticate peers. The ASA supports IKEv1 for connections from the legacy Cisco VPN client, and IKEv2 for the AnyConnect VPN client.
Ikev1 stands for IKE version 1. There are five parameters to define in each IKE policy:
encryption algorithm
hash algorithm
authentication method
Diffie-Hellman group identifier
lifetime of the security association1
A:
ISAKMP is the negotiation protocol that lets two hosts agree on how to build an IPsec security
association (SA). ISAKMP separates negotiation into Phase 1 and Phase 2. Phase 1 creates the first tunnel, which protects later ISAKMP negotiation messages. Phase 2 creates the tunnel that protects data.
IKE uses ISAKMP to setup the SA for IPsec to use. IKE creates the cryptographic keys used to authenticate peers. The ASA supports IKEv1 for connections from the legacy Cisco VPN client, and IKEv2 for the AnyConnect VPN client.
Ikev1 stands for IKE version 1. There are five parameters to define in each IKE policy:
encryption algorithm
hash algorithm
authentication method
Diffie-Hellman group identifier
lifetime of the security association1
0
0
I concur.
0
0