Kathy the security administrator at Certkiller Inc. is now working on the crypto map function on the PIX Firewall. What is another function of a crypto map on a PIX Firewall?
A.
The function of a crypto map is to configure a pre-shared authentication key and associate the key with an IKE peer address or host name.
B.
The function of a crypto map is to configure a pre-shared authentication key and associate the key with an IPSec peer address or host name.
C.
The function of a crypto map is to filter and classify the traffic to be protected.
D.
The function of a crypto map is to specify which algorithms to use with the selected security protocol.
Explanation:
Crypto map entries for IPSec set up security association parameters, Tying together the various parts configured for IPSec,including the following;
* Which traffic should be protected by IPSec
Reference: Cisco Secure PIX Firewalls (Ciscopress) Page 215