2547oDMVPN Deployment Requirements

Deploying 2547oDMVPN

Question

Which is one of the requirements to deploy 2547oDMVPN?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

C.

The deployment of 2547oDM VPN, which is a service provider VPN solution that provides end-to-end connectivity between the customer sites, requires specific configuration steps. Out of the options given, the requirement to deploy 2547oDM VPN is to configure a tunnel key information under the GRE interface, which is option B.

Option A, which is the configuration of the keepalive command under a GRE interface, is not a requirement for deploying 2547oDM VPN. The keepalive command is typically used to ensure that the interface remains up and to monitor the status of the connection.

Option C, which is the configuration of the crypto isakmp policy command, is not directly related to the deployment of 2547oDM VPN. The crypto isakmp policy command is used to configure the security policy for Internet Security Association and Key Management Protocol (ISAKMP) negotiations between the two VPN endpoints.

Option D, which is the configuration of a wildcard preshared key, is also not a requirement for deploying 2547oDM VPN. A preshared key is typically used to authenticate the VPN endpoints, but the use of a wildcard preshared key is not specific to 2547oDM VPN.

Therefore, the correct answer to the question is B, which is the requirement to configure a tunnel key information under the GRE interface.