Can you explain IKE phases? Can you explain IKE modes?



Can you explain IKE phases? Can you explain IKE modes?..

Answer / sami

There are Two Phases in IKE with 3 Phases.

phase 1 - isakmp sa will be created

phase 2 - ipsec sa to be created

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

Which statement is true regarding the user exec and privileged exec mode? A.) The '?' only works in Privileged exec B.) They are identical C.) They both require the enable password D.) User exec is a subset of the privileged exec

1 Answers  


Which of the following is a valid extended IP access-list? A.) router(config)# access-list 101 permit tcp host 172.16.30.0 any eq 21 log B.) router# access-list 101 permit tcp host 172.16.30.0 any eq 21 log C.) router(config)# acess-list 101 permit any any 172.16.30.0 D.) router(config)# access-list 101 permit ip host 172.16.30.0 any eq 21 log

2 Answers   HCL,


Identify the switching method that examines the destination MAC address as the frame is being received then begins forwarding the frame prior to receiving the entire frame? A.) Fragment-free B.) Store and Forward C.) Cut-through D.) Fast forward

2 Answers  


What does the meaning of interface 0/0?

0 Answers  


Which layer is responsible for flow control, acknowledgement, and windowing? A.) Transport B.) Network C.) Application D.) Session E.) Physical F.) Data Link

2 Answers  






You need to come up with a TCP/IP addressing scheme for your company. Which two factors must you consider when you define the subnet mask for the network? A.) The location of DHCP servers B.) The volume of traffic on each subnet C.) The number of subnets on the network D.) The location of the default gateway E.) The number of host IDs on each subnet

2 Answers  


What does the Spanning Tree Algorithm (STA) do? A.) Restore lost frames B.) Builds routing tables for routing through an internetwork C.) Forward packets through a switch D.) STA is implemented by STP to prevent loops

1 Answers  


why we assingn the wild card mask in the use of ospf and access list.

6 Answers   IBM,


You need to come up with a TCP/IP addressing scheme for your company. Which two factors must you consider when you define the subnet mask for the network? A.) The location of DHCP servers B.) The volume of traffic on each subnet C.) The number of subnets on the network D.) The location of the default gateway E.) The number of host IDs on each subnet

1 Answers  


Identify the command to reload the router? A.) Router(config)# reload B.) Router# reset C.) Router# reload D.) Router> reload

1 Answers  


What does the command "IP name-server 255.255.255.255" accomplish? A. It sets the domain name lookup to be a local broadcast. B. This is an illegal command. C. It disables domain name lookup. D. The command is now defunct and has been replaced by "IP server-name ip any"

1 Answers   Cisco,


How do you find the parameters that you can use with the SHOW command? A.) ? show B.) show ? C.) debug show D.) help E.) sh?

1 Answers  


Categories