Mastering Hub Device Routing in AD-VPN
20 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which component is used to manage the AD-VPN configuration on FortiManager?

  • BGP neighbor
  • IPsec phase-1
  • Route reflector
  • VPN Manager (correct)
  • What needs to be changed from their default values when configuring AD-VPN on FortiManager?

  • Protected networks (correct)
  • Net-device
  • IP-addresses
  • Add Route option
  • Which option needs to be disabled on the hub when configuring AD-VPN on FortiManager?

  • Protected networks
  • Add Route option (correct)
  • IP-addresses
  • Net-device
  • What needs to be enabled on the spokes when configuring AD-VPN on FortiManager?

    <p>Net-device</p> Signup and view all the answers

    What needs to be configured on the IPsec virtual interfaces when configuring AD-VPN on FortiManager?

    <p>IP-addresses</p> Signup and view all the answers

    What needs to be configured when using IBGP?

    <p>Route reflector</p> Signup and view all the answers

    What is the naming convention for phase-1 when using a FortiManager VPN console?

    <p>phase1name_0</p> Signup and view all the answers

    Where is the configuration of the Protected Subnet located?

    <p>All VPN Communities</p> Signup and view all the answers

    Which setting needs to be changed to enable AD-VPN in the IPsec phase-1?

    <p>Add Route option</p> Signup and view all the answers

    Which component needs to be enabled to allow dynamic routing?

    <p>BGP neighbor</p> Signup and view all the answers

    Which command can be used to verify the on-demand tunnels that are up?

    <p>get ipsec tunnel list</p> Signup and view all the answers

    What is the purpose of turning off the Add Route switch on the hub device for AD-VPN?

    <p>To prevent the hub from adding routes based on IKE negotiations</p> Signup and view all the answers

    What protocol does AD-VPN use instead of adding routes based on IKE negotiations?

    <p>BGP</p> Signup and view all the answers

    When can the commands shown on the slide be run on the spokes to verify routing updates?

    <p>After the tunnels between the hub and the spokes come up</p> Signup and view all the answers

    What does the IKE real-time debug help with in AD-VPN?

    <p>Debugging shortcut messages and spoke-to-spoke negotiations</p> Signup and view all the answers

    What does the output of the real-time debug show in AD-VPN?

    <p>Exchange of all shortcuts</p> Signup and view all the answers

    What happens when Spoke-1 receives an OFFER from the Hub in AD-VPN?

    <p>Spoke-1 sends a shortcut-query to Spoke-2</p> Signup and view all the answers

    When do on-demand tunnels in AD-VPN remain active?

    <p>Until they time out</p> Signup and view all the answers

    What does the routing table show after the on-demand tunnel is up in AD-VPN?

    <p>The network of Spoke-2 is directly accessible using the on-demand tunnel</p> Signup and view all the answers

    What can be specified when debugging IKE in AD-VPN?

    <p>Multiple IP-addresses</p> Signup and view all the answers

    More Like This

    Use Quizgecko on...
    Browser
    Browser