Articles in the CCNP Category
Subscribe to the CCNP RSS feed
What is a valid reason for configuring a list of backup servers on the Cisco AnyConnect VPN Client profile?
When deploying remote-access IPsec VPN tunnels, what is the key benefit of digital certificates?
Refer to the exhibit. Assuming that all other supporting configurations are correct, what can be determined from the partial IP admission configuration?
Refer to the exhibit. What can be determined about IPS updates from the configuration shown?
When 802.1X is implemented, how does the client and authenticator communicate?
On the Cisco Adaptive Security Appliance (ASA), where are the Layer 5 – 7 policy maps applied? A. Inside the Layer 5 – 7 class map. B. Inside the Layer 3 – 4 policy map. C. Inside the Layer 3 – 4 class map. D. Inside the Layer 3 – 4 service policy. Related Resources Cisco White Papers Related Course CCNP Security e-Camp
By default, how does the Cisco Adaptive Security Appliance (ASA) authenticate Adaptive Security Device Manager (ASDM) users?
The Cisco ASA is configured in multiple mode and the security contexts share the same outside physical interface. What are the two classification methods used by the Cisco ASA to determine which security context to forward the incoming traffic? (Choose two.)
Refer to the configuration statements shown below:
R1(config)#access-list 100 permit tcp host 10.1.1.1 host 172.16.1.1
R1(config)#access-list 100 permit tcp host 172.16.1.1 host 10.1.1.1
R1#debug ip packet 100 detail
What is the effect of this configuration sequence?
The following command is issued on a Cisco Router: Router(configuration)#logging console warnings. Which alerts will be seen on the console?