Review Questions
1: | What is the main difference between an access list on a Cisco IOS router and an access list on a PIX Firewall? |
2: | What command creates an RSA key pair on a PIX Firewall with a 1024-bit key length? |
3: | When using a GRE tunnel with an IOS router, where should you place the crypto map if you want to protect traffic going over the tunnel? |
4: | What command on a PIX Firewall enrolls a CA that has a CA nickname of myca? |
5: | What command on the PIX displays the IKE configuration within the router but does not display the default policy settings? |
6: | What command on the PIX bypasses conduits and access lists for IPSec connections but still checks the traffic against the ASA to maintain security? |
7: | What encryption and authentication are the defaults ... |
Get CCIE Practical Studies: Security (CCIE Self-Study) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.