After creating the Madrid gateway object with the proper VPN Domain, what are Barak’s remaining steps?

Barak is a Security Administrator for an organization that has two sites using prE. shared secrets in its VPN. The two sites are Oslo and London. Barak has just been informed that a new office is opening in Madrid, and he must enable all three sites to connect via the VPN to each other. Three Security Gateways are managed by the same SmartCenter Server, behind the Oslo Security Gateway. Barak decides to switch from prE. shared secrets to Certificates issued by the Internal Certificate Authority (ICA). After creating the Madrid gateway object with the proper VPN Domain, what are Barak’s remaining steps?

1. Disable “PrE. Shared Secret” on the London and Oslo gateway objects

2. Add the Madrid gateway object into the Oslo and London’s mesh VPN Community

3. Manually generate ICA Certificates for all three Security Gateways.

4. Configure “Traditional mode VPN configuration” in the Madrid gateway object’s VPN screen

5. Reinstall the Security Policy on all three Security Gateways.

Barak is a Security Administrator for an organization that has two sites using prE. shared secrets in its VPN. The two sites are Oslo and London. Barak has just been informed that a new office is opening in Madrid, and he must enable all three sites to connect via the VPN to each other. Three Security Gateways are managed by the same SmartCenter Server, behind the Oslo Security Gateway. Barak decides to switch from prE. shared secrets to Certificates issued by the Internal Certificate Authority (ICA). After creating the Madrid gateway object with the proper VPN Domain, what are Barak’s remaining steps?

1. Disable “PrE. Shared Secret” on the London and Oslo gateway objects

2. Add the Madrid gateway object into the Oslo and London’s mesh VPN Community

3. Manually generate ICA Certificates for all three Security Gateways.

4. Configure “Traditional mode VPN configuration” in the Madrid gateway object’s VPN screen

5. Reinstall the Security Policy on all three Security Gateways.

A.
1, 2, 5

B.
1, 3, 4, 5

C.
1, 2, 3, 5

D.
1, 2, 4, 5

E.
1, 2, 3, 4



Leave a Reply 0

Your email address will not be published. Required fields are marked *