Which IPsec security protocol should be used when confidentiality is required?()
A、A.AH
B、B.MD5
C、C.PSK
D、D.ESP
A、A.AH
B、B.MD5
C、C.PSK
D、D.ESP
A、show ike security-associations B、show ipsec security-associations C、show security ike security-associations D、show security ipsec security-associations
A、show crypto map ipsec sa B、show crypto map C、show crypto engine connections active D、show ipsec crypto map E、show crypto map sa F、show ipsec crypto map sa
A、IKE SA is bidirectional. B、IPsec SA is bidirectional. C、IKE SA is established during phase 2 negotiations. D、IPsec SA is established during phase 2 negotiations.
A、The crypto ACL number B、The IPSEC mode (tunnel or transport) C、The GRE tunnel interface IP address D、The GRE tunnel source interface or IP address, and tunnel destination IP address E、The MTU size of the GRE tunnel interface
A、 Restart the IPsec Policy Agent service on Server1 B、 Assign the Client (Respond Only) IPsec policy to Server1 C、 Assign the Server (Request Security) IPsec Policy to Server1 D、 Assign the Client (Respond Only) IPsec policy to all client computers
A、Cisco IOS IPsec/SSL VPN client B、Cisco VPN Clinet C、ISDN terminal adapter D、Cisco Adaptive Security Appliance