What is being used as the authentication method on the branch ISR?

Scenario:
You are the senior network security administrator for your organization. Recently and junior
engineer configured a site-to-site IPsec VPN connection between your headquarters Cisco ASA
and a remote branch office.
You are now tasked with verifying the IKEvl IPsec installation to ensure it was properly configured
according to designated parameters. Using the CLI on both the Cisco ASA and branch ISR. verify
the IPsec configuration is properly configured between the two sites.
NOTE: the show running-config command cannot be used for the this exercise.
Topology:


What is being used as the authentication method on the branch ISR?

Scenario:
You are the senior network security administrator for your organization. Recently and junior
engineer configured a site-to-site IPsec VPN connection between your headquarters Cisco ASA
and a remote branch office.
You are now tasked with verifying the IKEvl IPsec installation to ensure it was properly configured
according to designated parameters. Using the CLI on both the Cisco ASA and branch ISR. verify
the IPsec configuration is properly configured between the two sites.
NOTE: the show running-config command cannot be used for the this exercise.
Topology:


What is being used as the authentication method on the branch ISR?

A.
Certifcates

B.
Pre-shared keys

C.
RSA public keys

D.
Diffie-Hellman Group 2

Explanation:
The show crypto isakmp key command shows the preshared key of “cisco”



Leave a Reply 0

Your email address will not be published. Required fields are marked *