You are on page 1of 1

Q1. What if we want to give different password for XAUTH? Q2.

What is the difference between authentication and authorization? Q3. Why is PAT not supported by ESP? Q4. Why is a secondary IP address assigned to an interface ? Q5. Can Easy VPN be performed with ipsec profiles instead of dynamic crypto maps?

You might also like