Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Chapter 12. Troubleshooting and Performa... > Frequently Asked Questions

Frequently Asked Questions

The following Frequently Asked Questions, answered by the authors of this book, are designed to both measure your understanding of the concepts presented in this chapter and to assist you with real-life implementation of these concepts. To have your questions about this chapter answered by the author, browse to www.syngress.com/solutions and click on the “Ask the Author” form. You will also gain access to thousands of other FAQs at ITFAQnet.com.

Q:I suspect a key mismatch between my IKE peers. What can I do to verify that?
A:You can check syslog messages, which will display information about these types of errors. You can also use show crypto isakmp and view the configuration.
Q:What is the latest version of PIX software that supports Token Ring and FDDI interfaces?
A:Version 5.3. Versions after that have no support for Token Ring or FDDI.
Q:How do I determine how much memory is installed on my PIX firewall?
A:Use either the show version command or the show memory command.
Q:In a failover configuration, what determines which firewall is active and which is standby?
A:The failover cable that Cisco provides is strange, such that one end will cause the firewall to become the active in a failover configuration whereas the other end will become standby.


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint