Clarification on a review question in Implementing Cisco...
dirtyharry
Member Posts: 72 ■■□□□□□□□□
So there is a question at the end of chapter 5 in Implementing Cisco IOS Network Security that doesn't make sense:
8. Which of the following is not a part of a crypto map configuration?
A. Peer
B. Diffie-Hellman group
C. Transform set
D. Lifetime
The book says B is the right answer. How is that so? You can configure a d-h group in a crypto map...
8. Which of the following is not a part of a crypto map configuration?
A. Peer
B. Diffie-Hellman group
C. Transform set
D. Lifetime
The book says B is the right answer. How is that so? You can configure a d-h group in a crypto map...
Comments
-
blindrox Member Posts: 10 ■□□□□□□□□□Maybe you can - but the OCG places that step firmly in the isakmp policy configuration.
Page 544