What are the two phases of an IPSEC VPN?
- CRYPTO and POLICY
- IKE and CRYPTO
- IKE and IPSEC
- IKE and JONESEY
EXPLANATION
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=3&cad=rja&...
Configure Phase 2 of the IPsec VPN tunnel.
- (Optional) Configure a custom IPsec Phase 2 proposal. This step is optional, as you can use a predefined IPsec Phase 2 proposal set (Standard, Compatible, or Basic).
- Configure an IPsec policy that references either your custom IPsec Phase 2 proposal or a predefined IPsec Phase 2 proposal set. Specify perfect forward secrecy (PFS) keys.
- Configure an IPsec VPN tunnel that references both the
IKE gateway and the IPsec policy. Specify the proxy IDs to be used
in Phase 2 negotiations.
(For route-based VPNs) Bind the secure tunnel interface st0.x to the IPsec VPN tunnel.
SOURCE
https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=3&cad=rja&uact=8&ved=0ahUKEwijve__s_vXAhUs3IMKHfv7C1gQFggyMAI&url=http%3A%2F%2Fwww.ciscopress.com%2Farticles%2Farticle.asp%3Fp%3D24833%26seqNum%3D6&usg=AOvVaw0WF2U-qwYgHjTvkVu2BzSZ
0 comments:
Post a Comment