Review Questions

1:What is the main difference between an access list on a Cisco IOS router and an access list on a PIX Firewall?
2:What command creates an RSA key pair on a PIX Firewall with a 1024-bit key length?
3:When using a GRE tunnel with an IOS router, where should you place the crypto map if you want to protect traffic going over the tunnel?
4:What command on a PIX Firewall enrolls a CA that has a CA nickname of myca?
5:What command on the PIX displays the IKE configuration within the router but does not display the default policy settings?
6:What command on the PIX bypasses conduits and access lists for IPSec connections but still checks the traffic against the ASA to maintain security?
7:What encryption and authentication are the defaults ...

Get CCIE Practical Studies: Security (CCIE Self-Study) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.