• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/7

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

7 Cards in this Set

  • Front
  • Back
What is a Policy-Based VPN?
Traffic matching a defined policy is tunneled according to VPN tunnel defined in the policy.
What are the three minimum configurations for policy based VPNs?
IKE Phase 1 and IKE Phase 2 and a VPN Policy
What command is used to configure an IKE gateway Phase 1?
set ike gateway <gatewayname> address <gate-IP> outgoing-interface <interface> preshare <key> sec-level <standard, basic, or compatible>
What Command is used to create a IKE VPN?
set vpn <name> gateway <phase1 gateway name> sec-level <standard,basic, or compatible>
What is the command used to set up a VPN policy?
set policy from <src_object> to <dst_object> <service> tunnel vpn <VPN name>
What decides the use of a tunnel in policy based VPNs?
The current policy. The frames IP address Protocol number and/or port number is looked at to see if it matches the policy.
What is the Proxy ID number derived from and what is it used for?
Address book entries. Do verify the access policies of the two peers before connection is established.