
Explanation:
The scenario specifies:
According to the Google Cloud documentation on traffic selectors:
“When you use IKEv1, you can only supply a single CIDR for the local traffic selector and a single CIDR for the remote traffic selector. … Cloud VPN does not support creating a VPN tunnel by using IKEv1 with multiple Child SAs, each with a single CIDR.”
Because of this strict IKEv1 limitation (single Child SA per tunnel), you cannot specify multiple individual /24 subnets in the traffic selectors (as option C attempts). Option C would only work with IKEv2.
Recommended approach for multiple subnets with IKEv1:
Traffic selector configuration (from Cloud VPN perspective):
This matches option B exactly.
On the on-premises legacy device, you must configure the reversed selectors (local = on-prem 172.16.100.0/22, remote = GCP 192.168.100.0/22) to match.
This question tests your understanding of IKEv1 traffic selector limitations in Classic VPN policy-based tunnels. It's a common exam topic.
Ultimate access to all questions.
No comments yet.
Your organization has an on-premises legacy VPN device that only supports IKEv1 and cannot use BGP. You need to set up connectivity between your on-premises network (using subnets 172.16.100.0/24, 172.16.101.0/24, and 172.16.102.0/24) and Google Cloud (using subnets 192.168.100.0/24, 192.168.101.0/24, and 192.168.102.0/24). A VPN gateway is already configured. How should you proceed to set up a policy-based VPN tunnel?
A
Configure the tunnel with LOCAL_TS set to 172.16.100.0/22 and REMOTE_TS set to 192.168.100.0/22.
B
Configure the tunnel with LOCAL_TS set to 192.168.100.0/22 and REMOTE_TS set to 172.16.100.0/22.
C
Configure the tunnel with LOCAL_TS set to 172.16.100.0/24, 172.16.101.0/24, and 172.16.102.0/24, and REMOTE_TS set to 192.168.100.0/24,192.168.101.0/24, and 192.168.102.0/24.
D
Configure the tunnel with LOCAL_TS set to 172.16.100.0/24, 172.16.101.0/24, and 172.16.102.0/24, and REMOTE_TS set to 0.0.0.0/0.