CH 8 Revision
CH 8 Revision
• MD5
• AES
• SHA*
• DH
Two popular algorithms that are used to ensure that data is not intercepted and
modified (data integrity) are MD5 and SHA. The command Router1(config-
isakmp)# hash sha indicates that SHA is being used. AES is an encryption
protocol and provides data confidentiality. DH (Diffie-Hellman) is an algorithm
that is used for key exchange. RSA is an algorithm used for authentication.
20. What is needed to define interesting traffic in the creation of an IPsec
tunnel?
• security associations
• hashing algorithm
• access list*
• transform set
In order to bring up an IPsec tunnel, an access list must be configured with a
permit statement that will identify interesting traffic. Once interesting traffic is
detected by matching the access list, the tunnel security associations can be
negotiated.
21. Refer to the exhibit. What algorithm will be used for providing
confidentiality?