Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
7 Cards in this Set
- Front
- Back
What is a Policy-Based VPN?
|
Traffic matching a defined policy is tunneled according to VPN tunnel defined in the policy.
|
|
What are the three minimum configurations for policy based VPNs?
|
IKE Phase 1 and IKE Phase 2 and a VPN Policy
|
|
What command is used to configure an IKE gateway Phase 1?
|
set ike gateway <gatewayname> address <gate-IP> outgoing-interface <interface> preshare <key> sec-level <standard, basic, or compatible>
|
|
What Command is used to create a IKE VPN?
|
set vpn <name> gateway <phase1 gateway name> sec-level <standard,basic, or compatible>
|
|
What is the command used to set up a VPN policy?
|
set policy from <src_object> to <dst_object> <service> tunnel vpn <VPN name>
|
|
What decides the use of a tunnel in policy based VPNs?
|
The current policy. The frames IP address Protocol number and/or port number is looked at to see if it matches the policy.
|
|
What is the Proxy ID number derived from and what is it used for?
|
Address book entries. Do verify the access policies of the two peers before connection is established.
|