Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

For this assignment you will be required view the following two videos on youtub

ID: 3820764 • Letter: F

Question

For this assignment you will be required view the following two videos on youtube.

http://www.youtube.com/watch?v=bKJPxCPB-RE

http://www.youtube.com/watch?v=rUns1Jbve0w

After watching the video please indicate what encryption settings are used for phase 1 and phase 2. Please provide this for both of the videos. (25 points)

What are the benefits of IP compression? (25 points)

Are the steps to create VPN between Cisco and Checkpoint similar? Define the steps in your own terms and what is the activity that gets performed in each step? (50 points)

Explanation / Answer

For the first video phase 1 encryption method is AES256 and Phase2 encryption method is AES128

For the second video the encryption method is AES

Ip compression results to better response time when the network bandwidth is low. There will be no packet loss or anything when the ip is compressed. The quality, performance is increased with the ip header compression .

Because of ipheader compression there is decreased packet header compression, better response time, and packet loss is also reduced.

No there is lot of difference in creating site to site vpn in both cisco and checkpoint .

In cisco they have used the command line tool called putty and to setup the connections manually using commands.

Whereas in checkpoint they have a seperate application or software foe that by clicking and setting up values will be enough to create site to site vpn.

In CISCO the connection procedure is spanned into phases like below .

In phase 1 first they have done key exchange . This is handshake protocol phase which the two parties agreed upon connection.

And in phase 2 is tunnel encryption and the next step is

To create a Crypto map to the opposite interface which we try to connecting. In this phase we will identify the peers ,tunnel groups which we are going to connect and then

Creating access control list to identify traffic flow inside.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote