Procedures Flashcards
1
Q
What are the procedures for configuring IPsec over GRE?
A
- Create the GRE tunnel
- Create a pre-shared key
- crypto isakmp key <key> address <neighbor_ip_address></neighbor_ip_address></key>
- Create the ISAKMP policy
- crypto isakmp policy 10
- Create an ACL to match for encapsulation
- ip access-list extended MYACL
- Create a transform-set for IPsec
- crypto ipsec transform-set <name> <auth> <encryption></encryption></auth></name>
- Create a crypto map
- crypto map MYMAP 10 ipsec-isakmp
- Apply crypto map to interface
- interface fa0/0
- crypto map MYMAP
- interface fa0/0
2
Q
What are the procedures for configuring QOS
A
3
Q
What are the procedures for creating a GRE tunnel?
A
4
Q
IPsec over GRE using Crypto Maps
A
5
Q
IPsec over GRE using IPsec Profiles
A
6
Q
VTI over IPsec
A