Refer to the exhibit. A new TAC engineer came to you for advice. A GRE over IPsec tunnel was configured, but the tunnel is not coming up. W hat did the TAC engineer configure incorrectly?() A. The crypto isakmp configuration is not correct.B. The crypto map configuration is not correct.C. The interface tunnel configuration is not correct.D. The network configuration is not correct; netw ork 172.16.1.0 is missing.

Refer to the exhibit. A new TAC engineer came to you for advice. A GRE over IPsec tunnel was configured, but the tunnel is not coming up. W hat did the TAC engineer configure incorrectly?()

A. The crypto isakmp configuration is not correct.

B. The crypto map configuration is not correct.

C. The interface tunnel configuration is not correct.

D. The network configuration is not correct; netw ork 172.16.1.0 is missing.


相关考题:

Router R1, a branch router, connects to the Internet using DSL. Some traffic flows through a GRE and IPsec tunnel, over the DSL connection, destined for an Enterprise network.Which of the following answers best describes the router‘s logic that tells the router, for a given packet, to apply GRE encapsulation to the packet?()A. When the packet received on the LAN interface is permitted by the ACL listed on the tunnel greacl command under the incoming interfaceB. When routing the packet, matching a route whose outgoing interface is the GRE tunnel interfaceC. When routing the packet, matching a route whose outgoing interface is the IPsec tunnel interfaceD. When permitted by an ACL that was referenced in the associated crypto map

An engineer is reviewing another engineer‘s sample configuration for a GRE tunnel used to pass IPv6 traffiC. The tunnel ha s not yet been configured on the router.Which of the following commands is not required for the configuration to pass IPv6 traffic?()A. tunnel sourceB. tunnel destinationC. tunnel modeD. All these commands are requireD

Refer to the exhibit. Which interoperability technique implemented on the dual - stack routers would allow connectivity between IPv6 sites across automatic created tunnels using the 2002::/16 prefix? ()A. Dual StackB. NAT - PTC. 6to4 tunnelD. GRE tunnelE. ISATAP tunnel

Refer to the exhibit. A new TAC engineer comes to you for advice. The engineer wants to configure RIPv2 - OSPF two - way redistribution while avoiding routing loops. Which two additio ns to the router B1 configuration should the engineer make?()A. access - list 40 deny 172.16.1.0 0.0.0.255 access - list 40 permit any router rip redistribute ospf 100 metric 5 distribute- list 40 out ospf 100B. ip prefix - list rip_routes permit 172. 16.1.16/25 ge 26 le 28 route - map redis - ospf deny 10 match ip address prefix- list rip_routes router rip redistribute ospf 10 route - map redis - ospf subnetsC. ip prefix - list rip - to - ospf permit 10.1.1.8/25 ge 26 le 28 route - map redis - rip deny 20 match i p address prefix - list rip - to - ospf router ospf 100 redistribute rip route - map redis - rip subnetsD. access - list 15 deny 10.1.1.0 0.0.0.63 access - list 15 permit any route - map redis - rip deny 10 match ip address 15 route - map redis - rip permit 20 router os pf 100 redistribute rip route - map redis - rip subnets

To securely transport EIGRP traffic, a network administrator will build VPNs between sites. What is the best method to accomplish the transport of EIGRP traffic?() A. IPSec in tunnel modeB. IPSec in transport modeC. GRE with IPSec in transport modeD. GRE with IPSec in tunnel mode

You work as a network engineer, do you know an IPsec tunnel is negotiated within the protection of whichtype of tunnel?()A、L2F tunnelB、L2TP tunnelC、GRE tunnelD、ISAKMP tunnel

Router R1, a branch router, connects to the Internet using DSL. Some traffic flows through a GRE and IPsec tunnel, over the DSL connection, and into the core of an Enterprise network. The branch also allows local hosts to communicate directly with public sites in th e Internet over this same DSL connection. Which of the following answers defines how the branch NAT config avoids performing NAT for the Enterprise directed traffic but does perform NAT for the Internet - directed traffic?()A、By not enabling NAT on the I Psec tunnel interfaceB、By not enabling NAT on the GRE tunnel interfaceC、By configuring the NAT - referenced ACL to not permit the Enterprise trafficD、By asking the ISP to perform NAT in the cloud

Which two mechanisms can be used to detect IPsec GRE tunnel failures?()A、Dead Peer Detection (DPD)B、CDPC、isakmp keepalivesD、GRE keepalive mechanismE、The hello mechanism of the routing protocol across the IPsec tunnel

You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()A、The crypto ACL numberB、The IPSEC mode (tunnel or transport)C、The GRE tunnel interface IP addressD、The GRE tunnel source interface or IP address, and tunnel destination IP addressE、The MTU size of the GRE tunnel interface

An engineer is reviewing another engineer's sample configuration for a GRE tunnel used to pass IPv6 traffiC. The tunnel ha s not yet been configured on the router. Which of the following commands is not required for the configuration to pass IPv6 traffic?()A、tunnel sourceB、tunnel destinationC、tunnel modeD、All these commands are requireD

在GRE Tunnel接口视图下,配置隧道封装模式为GRE的完整命令为()。A、tunnel protocol greB、tunnel greC、tunnel-protocol greD、protocol gre

The following configuration exists on a router on one end of an IPv6 tunnel. Although the configuration added so far is correct, the configuration is incomplete. Which type of tunnel is most likely to be intended by the network engineer?() interface loopback 1 ip address 192.168.1.1 255.255.255.255 interface tunnel 2 ipv6 address 2002:C0A8:10 1::1/64 tunnel source loopback 1A、Automatic 6to4B、Manually configured tunnelC、ISATAPD、GRE

You want to dynamically assign users to an 802.1Q VLAN as a result of their authentication.  Inorder to accomplish this, which two IETF RADIUS attributes should you configure on the Cisco Secure ACS?()A、083 Tunnel-PreferenceB、066 Tunnel-Client-EndpointC、064 Tunnel-TypeD、082 Tunnel-Assignment-IDE、081 Tunnel-Private-Group-IDF、067 Tunnel-Server-Endpoint

To securely transport EIGRP traffic, a network administrator will build VPNs between sites. What is the best method to accomplish the transport of EIGRP traffic?()A、IPSec in tunnel modeB、IPSec in transport modeC、GRE with IPSec in transport modeD、GRE with IPSec in tunnel mode

You need to configure ISA3 in Seattle to enable communication with the network in New York.What should you do?()A、Open the ports for DNS, HTTP, HTTPS, Kerberos, RADIUS, LDAP, RPC endpoint mapper and client, and Server Message Block (SMB) over IPB、Enable the Routing and Remote Access Basic Firewall. Open the ports for DNS, Kerberos, LDAP, Exchange RPCs, RADIUS, L2TP, and Internet Key Exchange (IKE)C、Create a PPTP tunnel from ISA3 to the New York networkD、Create an L2TP/IPSec tunnel from ISA3 to the New York network

单选题To securely transport EIGRP traffic, a network administrator will build VPNs between sites. Whatis the best method to accomplish the transport of EIGRP traffic?()A IPSec in tunnel modeB IPSec in transport modeC GRE with IPSec in transport modeD GRE with IPSec in tunnel mode

多选题Which three features are benefits of using GRE tunnels in conjunction with IPsec for building site-to-site VPNs?()Aallows dynamic routing over the tunnelBsupports multi-protocol (non-IP) traffic over the tunnelCreduces IPsec headers overhead since tunnel mode is usedDsimplifies the ACL used in the crypto mapEuses Virtual Tunnel Interface (VTI) to simplify the IPsec VPN configuration

单选题Refer to the exhibit. With an IPSec tunnel established between remote Router A and head-end router B, with Compressed Real-Time Protocol (cRTP) configured on the serial interface of Router A, what impact will the cRTP configuration have on the Voice over IP packets flowing through the IPSec tunnel from a Cisco 7960 IP phone?()A Twenty bytes of header will be replaced with five bytes. B If the IPSec transform set includes Authentication Header, the receiving IPSec peer will discard the packets. C The IPSec packets will be dropped by Router A's compression logic.D The voice packets will not be compressed.

单选题You work as a network engineer, do you know an IPsec tunnel is negotiated within the protection of whichtype of tunnel?()AL2F tunnelBL2TP tunnelCGRE tunnelDISAKMP tunnel

单选题A policy-based IPsec VPN is ideal for which scenario?()Awhen you want to conserve tunnel resourcesBwhen the remote peer is a dialup or remote access clientCwhen you want to configure a tunnel policy with an action of denyDwhen a dynamic routing protocol such as OSPF must be sent across the VPN

多选题You are configuring an SRX210 as a firewall enforcer that will tunnel IPsec traffic from several Junos Pulse users.Which two parameters must you configure on the SRX210?()Aaccess profileBIKE parametersCtunneled interfaceDredirect policy

单选题The following configuration exists on a router on one end of an IPv6 tunnel. Although the configuration added so far is correct, the configuration is incomplete. Which type of tunnel is most likely to be intended by the network engineer?() interface loopback 1 ip address 192.168.1.1 255.255.255.255 interface tunnel 2 ipv6 address 2002:C0A8:10 1::1/64 tunnel source loopback 1AAutomatic 6to4BManually configured tunnelCISATAPDGRE

多选题You need to configure a GRE tunnel on a IPSec router. When you are using the SDM to configurea GRE tunnel over IPsec, which two parameters are required when defining the tunnel interfaceinformation?()AThe crypto ACL numberBThe IPSEC mode (tunnel or transport)CThe GRE tunnel interface IP addressDThe GRE tunnel source interface or IP address, and tunnel destination IP addressEThe MTU size of the GRE tunnel interface

单选题Router R1, a branch router, connects to the Internet using DSL. Some traffic flows through a GRE and IPsec tunnel, over the DSL connection, destined for an Enterprise network. Which of the following answers best describes the router's logic that tells the router, for a given packet, to apply GRE encapsulation to the packet?()AWhen the packet received on the LAN interface is permitted by the ACL listed on the tunnel greacl command under the incoming interfaceBWhen routing the packet, matching a route whose outgoing interface is the GRE tunnel interfaceCWhen routing the packet, matching a route whose outgoing interface is the IPsec tunnel interfaceDWhen permitted by an ACL that was referenced in the associated crypto map

单选题An engineer is reviewing another engineer's sample configuration for a GRE tunnel used to pass IPv6 traffiC. The tunnel ha s not yet been configured on the router. Which of the following commands is not required for the configuration to pass IPv6 traffic?()Atunnel sourceBtunnel destinationCtunnel modeDAll these commands are requireD

多选题Which two mechanisms can be used to detect IPsec GRE tunnel failures?()ADead Peer Detection (DPD)BCDPCisakmp keepalivesDGRE keepalive mechanismEThe hello mechanism of the routing protocol across the IPsec tunnel

单选题Router R1, a branch router, connects to the Internet using DSL. Some traffic flows through a GRE and IPsec tunnel, over the DSL connection, and into the core of an Enterprise network. The branch also allows local hosts to communicate directly with public sites in th e Internet over this same DSL connection. Which of the following answers defines how the branch NAT config avoids performing NAT for the Enterprise directed traffic but does perform NAT for the Internet - directed traffic?()ABy not enabling NAT on the I Psec tunnel interfaceBBy not enabling NAT on the GRE tunnel interfaceCBy configuring the NAT - referenced ACL to not permit the Enterprise trafficDBy asking the ISP to perform NAT in the cloud