Chapter 13

1: What does IPsec stand for?
A1: Answer: IP Security.
2: What three main protocols form IPsec?
A2: Answer: ESP, AH, and IKE.
3: What is the main difference between AH and ESP's capabilities?
A3: Answer: ESP provides data encryption and data integrity, whereas AH provides only data integrity for the whole packet.
4: Which phase does ISAKMP go through in negotiating IPsec SAs?
A4: Answer: Quick mode.
5: Can an IPsec crypto map point to more than one peer?
A5: Answer: Yes. If the first peer configured is unresponsive, the next one is tried, and so on, until a responsive peer is found.
6: What is the purpose of TED?
A6: Answer: To dynamically discover peer IP addresses without needing to configure them.
7: What is the purpose of the group command? ...

Get Network Security Principles and Practices now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.