question archive Part B: Secure LAW using ZPF Implement ZPF on the LAW router On the LAW router , configure ZPF using the following parameters : Zones: Create an inside zone named and an outside zone named ACL 100: Create an ACL 192

Part B: Secure LAW using ZPF Implement ZPF on the LAW router On the LAW router , configure ZPF using the following parameters : Zones: Create an inside zone named and an outside zone named ACL 100: Create an ACL 192

Subject:Computer SciencePrice:9.82 Bought3

Part B: Secure LAW using ZPF Implement ZPF on the LAW router On the LAW router , configure ZPF using the following parameters : Zones: Create an inside zone named and an outside zone named ACL 100: Create an ACL 192.168.0.0 /24 going to anywhere Class map : Identify the traffic to inspect using the class map name matching ACL 100 Policy Map : Create a policy map named to inspect the configured class map Zone pair : Create a zone pair named .Specify the source and destination zones that were created and the previously created policy map Verify the ZPF configuration From PC3 : ping PC2 . The pings should be successful From PC2 : ping PC3 . The pings should not be successful Part C: Secure LAN Traffic Between R2 and BR1 Configure VPN settings on R2 and BRI On R2 and BRI , configure reciprocating extended named ACLs called consisting of one ACE making the R.2 LAN traffic (i.e., 10.1.0.0 /16 ) and BRI LAN (i.e., 172.16.1.0 /24 ) traffic interesting IKE Phase 1 ISAKMP policy parameters Policy number Encryption Authentication : Pre -share Diffie -Hellman group : Crypto key: IKE Phase 2 IPsec policy parameters Transform -set name Encryption Authentication Crypto Map parameters : Crypto Map name : Use sequence number and identify it as an ipsec-isakmp map . Verify VPN operation

Option 1

Low Cost Option
Download this past answer in few clicks

9.82 USD

PURCHASE SOLUTION

Option 2

Custom new solution created by our subject matter experts

GET A QUOTE

rated 5 stars

Purchased 3 times

Completion Status 100%