Procedures Flashcards

1
Q

What are the procedures for configuring IPsec over GRE?

A
  • Create the GRE tunnel
  • Create a pre-shared key
    • crypto isakmp key <key> address <neighbor_ip_address></neighbor_ip_address></key>
  • Create the ISAKMP policy
    • crypto isakmp policy 10
  • Create an ACL to match for encapsulation
    • ip access-list extended MYACL
  • Create a transform-set for IPsec
    • crypto ipsec transform-set <name> <auth> <encryption></encryption></auth></name>
  • Create a crypto map
    • crypto map MYMAP 10 ipsec-isakmp
  • Apply crypto map to interface
    • interface fa0/0
      • crypto map MYMAP
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the procedures for configuring QOS

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the procedures for creating a GRE tunnel?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

IPsec over GRE using Crypto Maps

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

IPsec over GRE using IPsec Profiles

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

VTI over IPsec

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly