What is the effect of the given command sequence?

Refer to the exhibit.

What is the effect of the given command sequence?

Refer to the exhibit.

What is the effect of the given command sequence?

A.
It defines IPSec policy for traffic sourced from 10.10.10.0/24 with a destination of 10.100.100.0/24.

B.
It defines IPSec policy for traffic sourced from 10.100.100.0/24 with a destination of 10.10.10.0/24.

C.
It defines IKE policy for traffic sourced from 10.10.10.0/24 with a destination of 10.100.100.0/24.

D.
It defines IKE policy for traffic sourced from 10.100.100.0/24 with a destination of 10.10.10.0/24.



Leave a Reply 1

Your email address will not be published. Required fields are marked *


Marcel

Marcel

A:

Crypto maps define the IPsec policy to be negotiated in the IPsec SA

A crypto map set consists of one or more crypto maps that have the same map name. You create a crypto map set when you create its first crypto map. The following command syntax creates or adds to a crypto map:
crypto map map-name seq-num match address access-list-name

The sequence number (seq-num) shown in the syntax above distinguishes one crypto map from another one with the same name. The sequence number assigned to a crypto map also determines its priority among the other crypto maps within a crypto map set. The lower the sequence number, the higher the priority. 

The ACL assigned to a crypto map consists of all of the ACEs that have the same access list name, as shown in the following command syntax:
access-list access-list-name {deny | permit} ip source source-netmask destination destination-netmask