Which step is optional when configuring the crypto maps on the Firewalls?

You are creating a site-to-site VPN using IPSec between two PIX Firewalls. Which step is optional
when configuring the crypto maps on the Firewalls?

You are creating a site-to-site VPN using IPSec between two PIX Firewalls. Which step is optional
when configuring the crypto maps on the Firewalls?

A.
Assign an ACL to the crypto map entry.

B.
Create a crypto map entry identifying the crypto map with a unique crypto map name and
sequence number.

C.
Specify a dynamic crypto map to act as a policy template where the missing parameters are
later dynamically configured to match a peer’s requirements.

D.
Specify which transform sets are allowed for this crypto map entry.

E.
Specify the peer to which IPSec-protected traffic can be forwarded.



Leave a Reply 0

Your email address will not be published. Required fields are marked *