B is correct. When you use “address” it is referring to the remote peer you share the key with. If you want to add more than 1 ip add, you will have to use group key.
C is correct
did this ins GNS3
R1(config)#crypto isakmp key 123123 address 172.16.0.0
R1(config)#end
R1#show crypto isakmp key
Keyring Hostname/Address Preshared Key
default 172.16.0.0 [255.255.0.0] 123123
same as Seawanderer did
You are correct, I have verified in IOU. because the command "crypto isakmp key ciscXXXXXXXX address 172.16.0.0" did not specified the mask, the router will take is as /16, unless you specify the mask as "crypto isakmp key ciscXXXXXXXX address 172.16.0.0 255.255.255.0", the router will take it as /24.
This is not always a network address.... for example on this subnet 172.16.4.0/23, 172.16.5.0 is a valid IP address, and nothing to do with network address. It just looks weird because people tend to subnet on /24's mostly.
C is correct. https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios/218432-configure-a-site-to-site-ipsec-ikev1-tun.html....ikev1 is key....no pun intended....ikev2 diff, see below. https://www.cisco.com/c/en/us/support/docs/security/asa-5500-x-series-next-generation-firewalls/118652-configure-asa-00.html
isakmp command refers to IKEv1 and without specifying a mask it will use the default classful mask which in this case would be 255.255.0.0 for 172.16.0.0. So answer C is absolutely the correct answer. nospampls also demonstrates this with output.
C is correct, the command crypto isakmp key ciscXXXXXXXX address 172.16.0.0 0.0.255.255 authenticates IKEv1 peers in the 172.16.0.0/16 range by using the preshared key ciscXXXXXXXX.
The command crypto isakmp key you provided is related to IKEv1, not IKEv2. IKEv1 (Internet Key Exchange version 1) is configured using crypto isakmp commands, whereas IKEv2 (Internet Key Exchange version 2) is configured using crypto ikev2 commands.
If you want to configure a pre-shared key for IKEv1, the crypto isakmp key command is used as shown in your original question. If you want to configure a pre-shared key for IKEv2, you would use crypto ikev2 keyring and crypto ikev2 profile commands. The distinction is important because the two versions of IKE have different configurations and characteristics.
So IMHO - C is the right answer!
C is correct, o IOS assumes a /16 mask if you omit the mask, like when you put at the and 0.0.0.0 and the IOS assumes a /0 mask (any).
I test in the lab:
...
Router(config)# crypto isakmp key Mudar@123 address 172.16.0.0
Router(config)#do show crypto isakmp key
Keyring Hostname/Address Preshared Key
default 172.16.0.0 [255.255.0.0] Mudar@123
Router(config)#
Some of you are overthinking this. Go here: https://www.cisco.com/c/en/us/td/docs/ios/12_2/security/command/reference/srfike.html#wp1017897
Search: crypto isakmp key and read. When you enter the peer using address, the mask is optional if you want to specify the subnet. If you specify no subnet then the address is to a single peer. In this case, 172.16.0.0/32 leaving B the only correct answer.
Explanation from the source:
mask (Optional) Specify the subnet address of the remote peer. (The argument can be used only if the remote peer ISAKMP identity was set with its IP address.)
With the address keyword, you can also use the mask argument to indicate the remote peer ISAKMP identity will be established using the preshared key only. If the mask argument is used, preshared keys are no longer restricted between two users.
Note
If you specify mask, you must use a subnet address. (The subnet address 0.0.0.0 is not recommended because it encourages group preshared keys, which allow all peers to have the same group key, thereby reducing the security of your user authentication.)
C is correct
Apart from reasons already given by other C campaigners
ikev2 uses a different format for keys
crypto ikev2 keyring IKEv2-KEYRING
peer 1.2.3.4
address 1.2.3.4
pre-shared-key cisco123
apart from that whe you actually run the command in a lab it results in
172.16.0.0 [255.255.0.0]
It assumes a subnet for anything that ends in .0
This question is tricky, it is testing the concept I believe. According to the CLI, it should be "peer". In Option B, it is 172.16.0.0/32 "peer", but in Option C, it is 172.16.0.0 "range". No matter then can be reachable, I will select the one with "peer".
B
"If the mask argument is used, preshared keys are no longer restricted between two users"
so its restricted to 172.16.0.0
https://www.cisco.com/c/en/us/td/docs/ios/12_2/security/command/reference/srfike.html
i tested it on a real router and the output was
Keyring Hostname/Address Preshared Key
default 172.16.0.0 [255.255.0.0] cisco
but if i use 172.0.0.1
Keyring Hostname/Address Preshared Key
default 172.16.0.1 cisco
weird thing , not B
This section is not available anymore. Please use the main Exam Page.350-701 Exam Questions
Log in to ExamTopics
Sign in:
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Ampersand
Highly Voted 4 years, 1 month agonospampls
3 years, 8 months agokwong328
2 years, 1 month agojaciro11
3 years, 4 months agothefiresays
Highly Voted 4 years, 1 month agoloiphin
3 years, 4 months agowillroute
Most Recent 5 months, 1 week agoluismg
7 months, 3 weeks agoRockbo47
8 months, 2 weeks agoc3qu1
1 year, 1 month agoxziomal9
1 year, 5 months agosquirrel49
1 year, 6 months agoRafaelSTI
1 year, 8 months agonep1019
1 year, 8 months agonep1019
1 year, 8 months agofdl543
1 year, 9 months agowizzlewazzle
1 year, 10 months agoG33
1 year, 10 months agoKromwall
1 year, 10 months agogc999
1 year, 11 months agohaiderzaid
2 years agohaiderzaid
2 years agoangry
2 years, 1 month ago