exam questions

Exam 300-410 All Questions

View all questions & answers for the 300-410 exam

Exam 300-410 topic 1 question 92 discussion

Actual exam question from Cisco's 300-410
Question #: 92
Topic #: 1
[All 300-410 Questions]

Refer to the exhibit. After applying IPsec, the engineer observed that the DMVPN tunnel went down, and both spoke-to-spoke and hub were not establishing.
Which two actions resolve the issue? (Choose two.)

  • A. Change the mode from mode tunnel to mode transport on R3.
  • B. Remove the crypto isakmp key cisco address 10.1.1.1 on R2 and R3.
  • C. Configure the crypto isakmp key cisco address 192.1.1.1 on R2 and R3.
  • D. Configure the crypto isakmp key cisco address 0.0.0.0 on R2 and R3.
  • E. Change the mode from mode transport to mode tunnel on R2.
Show Suggested Answer Hide Answer
Suggested Answer: AD 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
Guitarman
Highly Voted 4 years, 4 months ago
I LITERALLY just labbed this. Please forgive the long explanation but I want to share for future testers. I was torn between changing the tunnel mode or removing one address and adding the other. B and D are definitely correct. You can't just put in the command with 0.0.0.0. If you do, you will end up with two crypto key commands and both addresses so the one to the tunnel address MUST be removed. Again, NO DOUBT...B AND D!!!!!
upvoted 25 times
jabal93
5 months ago
answers are A & D please see my explanation below.
upvoted 1 times
...
spiderconnard
3 years, 5 months ago
Having many crypto keys is not an issue. you can leave the 10.1.1.1. If you add on top of it either 0.0.0.0 or 192.1.1.1 the tunnel protocol will go up.
upvoted 10 times
vdsdrs
3 years, 5 months ago
Does it mean that C and D are correct?
upvoted 2 times
...
...
...
louisvuitton12
Highly Voted 1 year, 2 months ago
Selected Answer: AD
Worked at Cisco TAC VPN team for over a year. A and D are correct.
upvoted 9 times
...
CiscoTerminator
Most Recent 4 weeks, 1 day ago
Selected Answer: DE
why is E NOT correct: "Change the mode from mode transport to mode tunnel on R2" since the transports have to match on both ends?
upvoted 1 times
IvAlAx
1 week, 6 days ago
Mode is important: since we are using GRE, we are already using tunnels, so we can use transport mode. If you use tunnel mode, you will have even more overhead that you don't need.
upvoted 1 times
...
...
jabal93
5 months ago
Selected Answer: AD
A: IPSEC profile support both modes (tunnel or transport) but there is a catch, both end of the tunnel must have the same IPSEC-PROFILE to be able to authenticate, in simple terms the modes are part of the IPSEC profile so they must match on both routers IPSEC profile. D: we should replace the specified address (10.1.1.1) on the spokes and replaced it with (0.0.0.0) which it means in simple terms "negotiate this IPSEC profile with anybody have it". B: is useless because already included in answer D.
upvoted 4 times
jabal93
5 months ago
Sorry for my poor english but i hope you guys got the picture ;)
upvoted 2 times
...
...
bk989
5 months, 1 week ago
The answer is A, D. Refer to my comment below. It's not A,B that was a typo.
upvoted 1 times
bk989
5 months, 1 week ago
In the lab scenario I posted below mismatched tunnels meant the spokes couldn't reach eachother, but the could reach the hub. The crypto keys are processed until a match is found
upvoted 1 times
bk989
5 months, 1 week ago
Here is the config for R3: crypto isakmp policy 10 hash md5 authentication pre-share group 2 crypto isakmp key cisco address 10.1.1.1 crypto isakmp key cisco address 0.0.0.0 ! ! crypto ipsec transform-set TSET esp-des mode transport ! crypto ipsec profile TST set transform-set TSET ! ! ! ! ! ! ! interface Loopback0 ip address 2.2.2.2 255.255.255.0 ! interface Tunnel0 ip address 10.1.1.3 255.255.255.0 no ip redirects ip nhrp map 10.1.1.1 192.1.1.1 ip nhrp map multicast 192.1.1.1 ip nhrp network-id 1 ip nhrp nhs 10.1.1.1 ip nhrp shortcut tunnel source Ethernet0/0 tunnel mode gre multipoint tunnel protection ipsec profile TST
upvoted 1 times
bk989
5 months, 1 week ago
R3(config-if)#do ping 10.1.1.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 10.1.1.1, timeout is 2 seconds: ..... R3(cfg-crypto-trans)#crypto ipsec transform-set TSET esp-des R3(cfg-crypto-trans)# mode tunnel R3(cfg-crypto-trans)#do ping 10.1.1.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 10.1.1.1, timeout is 2 seconds: .!!!! Success rate is 80 percent (4/5), round-trip min/avg/max = 5/5/6 ms R3(cfg-crypto-trans)# the tunnel mode needs to be the same, and it is okay to have more than 1x key
upvoted 1 times
...
...
...
...
tubirubs
5 months, 1 week ago
Selected Answer: AD
In ENARSI Official Cert Guild, CISCO tells: "... mode tunnel in IPsec is not necessary. Add more 20bytes to header and not take any benefity... USE TRANSPORTE MODE" pag 827 for second edition.
upvoted 2 times
bk989
4 months, 2 weeks ago
tunnel mode is necessary for crypto ipsec fragmentation before-encryption, but the answer is A D
upvoted 1 times
...
...
[Removed]
6 months ago
Selected Answer: BD
im going with B & D
upvoted 1 times
[Removed]
5 months ago
after research, A & D are correct
upvoted 1 times
...
[Removed]
5 months ago
after research, A & D are correct
upvoted 1 times
...
...
Fenix7
6 months ago
B and D are correct. You need simulate in the lab.
upvoted 1 times
...
bk989
7 months ago
Answer is A, B I will prove it R1 Config: crypto isakmp policy 10 hash md5 authentication pre-share group 2 crypto isakmp key cisco address 0.0.0.0 ! ! crypto ipsec transform-set TSET esp-des mode tunnel ! crypto ipsec profile TST set transform-set TSET ! ! ! ! ! ! ! interface Loopback0 ip address 1.1.1.1 255.255.255.0 ! interface Tunnel0 ip address 10.1.1.1 255.255.255.0 no ip redirects ip nhrp map multicast dynamic ip nhrp network-id 1 ip nhrp redirect tunnel source Ethernet0/0 tunnel mode gre multipoint tunnel protection ipsec profile TST
upvoted 1 times
Rupirapa
3 weeks ago
How do you know the hub is in "mode tunnel"?
upvoted 1 times
...
bk989
7 months ago
R2 Config:crypto isakmp policy 10 hash md5 authentication pre-share group 2 crypto isakmp key cisco address 10.1.1.1 ! ! crypto ipsec transform-set TSET esp-des mode tunnel ! crypto ipsec profile TST set transform-set TSET ! ! ! ! ! ! ! interface Loopback0 ip address 2.2.2.2 255.255.255.0 ! interface Tunnel0 ip address 10.1.1.2 255.255.255.0 no ip redirects ip nhrp map 10.1.1.1 192.1.1.1 ip nhrp map multicast 192.1.1.1 ip nhrp network-id 1 ip nhrp nhs 10.1.1.1 ip nhrp shortcut tunnel source Ethernet0/1 tunnel mode gre multipoint tunnel protection ipsec profile TST R2(config-if)# R2(config-if)#do ping 10.1.1.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 10.1.1.1, timeout is 2 seconds:
upvoted 1 times
bk989
7 months ago
R2 modify address: crypto isakmp key cisco address 0.0.0.0 R2(config)#do ping 10.1.1.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 10.1.1.1, timeout is 2 seconds: ..... Ping times out: why? We still have the IPSEC SA mapped to 10.1.1.1 R2#ping 10.1.1.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 10.1.1.1, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 5/7/10 ms R2# R2# Hence you do not need to remove the R2: sh run crypto isakmp key cisco address 10.1.1.1 crypto isakmp key cisco address 0.0.0.0 ! R2#ping 10.1.1.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 10.1.1.1, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 5/9/18 ms R2#
upvoted 1 times
bk989
7 months ago
Now change R2 mode to transport: R2: mode transport But R2 can still ping R1!!!! R2(config-if)#do ping 10.1.1.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 10.1.1.1, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 9/9/10 ms R2(config-if)# BUT R3 CANT Ping R2!!! R3(config-if)#do ping 10.1.1.2 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 10.1.1.2, timeout is 2 seconds: *Jun 17 12:37:14.026: %NHRP-3-PAKERROR: Received Error Indication from 10.1.1.1, code: protocol generic error(7), (trigge r src: 10.1.1.3 (nbma: 192.1.1.3) dst: 10.1.1.2), offset: 0, data: 00 01 08 00 00 00 00 00 00 FF 00 48 EC 19 00 34 ... *Jun 17 12:37:19.584: %NHRP-3-PAKERROR: Received Error Indication from 10.1.1.1, code: protocol generic error(7), (trigge
upvoted 1 times
bk989
7 months ago
Change R2 to tunnel again R3(config-if)#do ping 10.1.1.1 Type escape sequence to abort. Sending 5, 100-byte ICMP Echos to 10.1.1.1, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 5/8/10 ms R3(config-if)#
upvoted 1 times
bk989
7 months ago
The answer is A B
upvoted 1 times
...
...
...
...
...
...
XBfoundX
7 months, 1 week ago
DMVPN uses GRE, NHRP can be only be incapsuleted in a GRE packet. If you change the mode of the tunnel in ipsec then you are going to have a VTI instead of a GRE tunnel interface, the result is that you cannot longer use DMVPN. So first we need to take off the tunnel mode ipsec and use transport mode. Because we have more than one peer and we need to add the command to have all the peer using the same preshared key otherwise you will not be able to build up the phase 1 tunnel
upvoted 1 times
XBfoundX
7 months, 1 week ago
Answer is A and D
upvoted 1 times
...
...
bk989
9 months, 3 weeks ago
Answer is A and D. it will run throuhg the key addresses in order. "You can have multiple isakmp policies on your router. The router will run through them in order until it finds a match. So you just need to add a new isakmp policy with a different sequence number eg." https://community.cisco.com/t5/other-security-subjects/can-you-have-multiple-crypto-isakmp-policies-on-a-router/td-p/840716
upvoted 3 times
...
T_Cos
1 year ago
Options A and D are correct
upvoted 1 times
...
Ll123123
1 year, 2 months ago
Selected Answer: AD
AD I would say
upvoted 2 times
...
mouin
1 year, 4 months ago
Selected Answer: AD
I've been playing around with this lab for an hour. The correct answer with no doubt is AD
upvoted 2 times
...
Brand
1 year, 4 months ago
Selected Answer: AD
I tested this scenario in my DMVPN lab just now. For this lab I configured ipsec transform-set with "mode tunnel" on hub and also in spokes. DMVPN was up, EIGRP was working etc. But than I changed the transform-set in spoke2 to "mode transport" and shut/no shut the tunnel interface. Spoke2 is not able to ping hub or the other spoke after that. So I'm 100% sure that one of the answers is "A" and looks like having multiple keys is not an issue so I'd go with "D" as well. But before taking my comment as absolutely correct, lab it yourself.
upvoted 2 times
...
inteldarvid
1 year, 5 months ago
Selected Answer: BD
100 % B and D I check in lab
upvoted 2 times
...
inteldarvid
1 year, 6 months ago
Selected Answer: BD
Corerct Band D: You can't just put in the command with 0.0.0.0. If you do, you will end up with two crypto key commands and both addresses so the one to the tunnel address MUST be removed.
upvoted 2 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago