Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
EC 332
#1
Correct answers are

Remove all configuration related to crypto map from R1 and R2 and eliminate the ACL.
Create an IPsec profile, associate the transform-set, and apply the profile to the tunnel interface.

https://www.youtube.com/watch?v=A6UoUOsbWuk


https://www.cisco.com/c/en/us/td/docs/io...F46CFDD07B
Reply
#2
The question has been updated. Thank you!
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)