| ]

Here you will find answers to IPSec VPN questions:

Question 1

IPSec VPN is a widely-acknowledged solution for enterprise network. Which three IPsec VPN statements are true? (Choose three)

A - IKE keepalives are unidirectional and sent every ten seconds.
B - IPsec uses the Encapsulating Security Protocol (ESP) or the Authentication Header (AH) protocol for exchanging keys.
C - To establish IKE SA, main mode utilizes six packets while aggressive mode utilizes only three packets.
D - IKE uses the Diffie-Hellman algorithm to generate symmetrical keys to be used by IPsec peers.

Answer: A C D

Question 2

Study the exhibit carefully. The Cisco IOS IPsec High Availability (IPsec HA) Enhancements feature provides an infrastructure for reliable and secure networks to provide transparent availability of the VPN gateways - that is, Cisco IOS Software-based routers. What are the two options that are used to provide High Availability IPsec? (Choose two)

crypto map mymap 1 ipsec-isakmp
set peer 10.1.1.1
reverse-route
set transform-set esp-3des-sha
match address 102

Interface fastethemet 0/0
ip address 192.168.0.2 255.255.255.0
standby name group 1
standby ip 192.168.0.3
crypto map mymap redundancy group1

access-list 102 permit ip 192.168.1.0 0.0.0.255 10.0.0.0 0.255.255.255

A - HSRP
B - Dual Router Mode (DRM) IPsec
C - IPsec Backup Peerings
D - RRI

Answer: A D

Explanation:

The "standby ip" command specifies HSRP is being used (and it establishes 192.168.0.3 as the IP of the virtual router).

The "crypto map" and "reverse-route" lines specify Reverse Route Injection (RRI) is being used. Reverse Route Injection (RRI) is the process of injecting a static route into the Interior Gateway Protocol (IGP) routing table.

To configure RRI under a static crypto map, we perform the following steps:

1. configure terminal
2. crypto map {map-name} {seq-name} ipsec-isakmp (creates or modifies a crypto map entry and enters crypto map configuration mode)
3. reverse-route [static | tag tag-id [static] | remote-peer [static] | remote-peer ip-address [static]] (creates source proxy information for a crypto map entry)

Question 3

IPSec VPN is a widely-acknowledged solution for enterprise network. What are the four steps to setup an IPsec VPN?

A - Step 1: Interesting traffic initiates the IPsec process.
Step 2: ESP authenticates IPsec peers and negotiates IKE SAs.
Step 3: ESP negotiates IPsec SA settings and sets up matching IPsec SAs in the peers.
Step 4: Data is securely transferred between IPsec peers.
B - Step 1: Interesting traffic initiates the IPsec process.
Step 2: IKE negotiates IPsec SA settings and sets up matching IPsec SAs in the peers.
Step 3: IKE authenticates IPsec peers and negotiates IKE SAs.
Step 4: Data is securely transferred between IPsec peers.
C - Step 1: Interesting traffic initiates the IPsec process.
Step 2: IKE authenticates IPsec peers and negotiates IKE SAs.
Step 3: IKE negotiates IPsec SA settings and sets up matching IPsec SAs in the peers.
Step 4: Data is securely transferred between IPsec peers.
D - Step 1: Interesting traffic initiates the IPsec process.
Step 2: AH authenticates IPsec peers and negotiates IKE SAs.
Step 3: AH negotiates IPsec SA settings and sets up matching IPsec SAs in the peers.
Step 4: Data is securely transferred between IPsec peers.

Answer: C

Question 4

Which statement correctly describes IPsec VPN backup technology?

A - The cypto isakmp keepalive command is used to configure the Stateful Switchover (SSO) protocol.
B - Reverse Route Injection (RRI) is configured on at the remote site to inject the central site networks.
C. Each Hot Standby Routing Protocol (HSRP) standby group has two well-known MAC addresses and a virtual IP address.
D. The cypto isakmp keepalive command is used to configure stateless failover.

Answer: D

Question 5

You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configure a GRE tunnel over IPsec, which two parameters are required when defining the tunnel interface information? (Select two)

A - The crypto ACL number
B - The IPSEC mode (tunnel or transport)
C - The GRE tunnel interface IP address
D - The GRE tunnel source interface or IP address, and tunnel destination IP address
E - The MTU size of the GRE tunnel interface

Answer: C D