Which transform set is being used on the branch ISR?

Scenario:
You are the senior network security administrator for your organization. Recently and junior engineer configured a site-to-site IPsec VPN connection between your
headquarters Cisco ASA and a remote branch office.
You are now tasked with verifying the IKEvl IPsec installation to ensure it was properly configured according to designated parameters. Using the CLI on both the
Cisco ASA and branch ISR. verify the IPsec configuration is properly configured between the two sites.
NOTE: the show running-config command cannot be used for the this exercise.
Topology:

Which transform set is being used on the branch ISR?

Scenario:
You are the senior network security administrator for your organization. Recently and junior engineer configured a site-to-site IPsec VPN connection between your
headquarters Cisco ASA and a remote branch office.
You are now tasked with verifying the IKEvl IPsec installation to ensure it was properly configured according to designated parameters. Using the CLI on both the
Cisco ASA and branch ISR. verify the IPsec configuration is properly configured between the two sites.
NOTE: the show running-config command cannot be used for the this exercise.
Topology:

Which transform set is being used on the branch ISR?

A.
Default

B.
ESP-3DES ESP-SHA-HMAC

C.
ESP-AES-256-MD5-TRANS mode transport

D.
TSET

Explanation:
This can be seen from the “show crypto ipsec sa” command as shown below:



Leave a Reply 0

Your email address will not be published. Required fields are marked *