exam questions

Exam 300-820 All Questions

View all questions & answers for the 300-820 exam

Exam 300-820 topic 1 question 41 discussion

Actual exam question from Cisco's 300-820
Question #: 41
Topic #: 1
[All 300-820 Questions]


Refer to the exhibit. An Expressway-C and Expressway-E are configured for B2B calling and the Expressway-E zone is set to TLS Verify Currently, calls do not reach the Expressway-C. The Traversal Client zone on the Expressway-C for B2B reports the information in the exhibit for the Peer 1 address.
Which action resolves this error?

  • A. Configure the Expressway-C Traversal Client zone Peer 1 address with the fully qualified domain name of the Expressway-E.
  • B. Configure the Expressway-C Traversal Client zone transport protocol with TCP.
  • C. Add a server certificate to the Expressway-C that is signed by a certificate authority.
  • D. Add an intermediate certificate to the Expressway-C that is signed by a certificate authority.
Show Suggested Answer Hide Answer
Suggested Answer: D 🗳️

Comments

Chosen Answer:
This is a voting comment (?). It is better to Upvote an existing comment if you don't have anything to add.
Switch to a voting comment New
chamba87
Highly Voted 2 years, 8 months ago
Yep i feel the same, the answer is C
upvoted 5 times
...
iamnoone
Most Recent 1 month, 3 weeks ago
Selected Answer: D
Correct answer should be D. There's no such a thing like a "temporary CA". An Issuer (CA) is an Issuer. It signs certificates. This is just the common name of the CA used to sign the certificate. It can be whatever. In this case TLS fails as stated in the Event Log Detail because of "tlsv1 alert unknown ca". This means that the certificate presented for the TLS negotiation is not trusted by the Exp-C, because of the lack of an intermediate or root certificate that signed the specific certificate. (public or private) So, either an intermediate is missing, or the root certificate of teh CA in the trust store is not there.
upvoted 1 times
...
Collabinski
9 months, 2 weeks ago
If TLS verify mode is enabled, the neighbor system's FQDN or IP address, as specified in the Peer address field of the zone’s configuration, is used to verify against the certificate holder’s name in the X.509 certificate presented by that system. (The name must be in the SAN attribute of the certificate.) The certificate itself must also be valid and signed by a trusted certificate authority. So when certificates have been generated with peer or cluster FQDNs, ensure that the zone's Peer address fields are configured with FQDNs rather than IP addresses. -https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/expressway/config_guide/X14-0-2/cert_creation_use/exwy_b_certificate-creation-and-use-deployment-guide-x1402/exwy_b_certificate-creation-use-deployment-guide_chapter_01000.html#concept_BFDB31BC4989A5EB232AF2A85AD1727E
upvoted 1 times
...
Collabinski
9 months, 2 weeks ago
Tough question. Could be A or D. Managing the Trusted CA Certificate List The Trusted CA certificate page (Maintenance > Security certificates > Trusted CA certificate) allows you to manage the list of certificates for the Certificate Authorities (CAs) trusted by this Expressway. When a TLS connection to Expressway mandates certificate verification, the certificate presented to the Expressway must be signed by a trusted CA in this list and there must be a full chain of trust (intermediate CAs) to the root CA. https://www.cisco.com/c/dam/en/us/td/docs/voice_ip_comm/expressway/config_guide/X8-9/Cisco-Expressway-Certificate-Creation-and-Use-Deployment-Guide-X8-9.pdf
upvoted 1 times
...
Collabinski
9 months, 3 weeks ago
SIP TLS Negotiation Failures on Neighbor and Traversal Zones If TLS verify mode is enabled, the neighbor system's FQDN or IP address, as specified in the Peer address field of the zone’s configuration, is used to verify against the certificate holder’s name in the X.509 certificate presented by that system. (The name must be in the SAN attribute of the certificate.) The certificate itself must also be valid and signed by a trusted certificate authority. So when certificates have been generated with peer or cluster FQDNs, ensure that the zone's Peer address fields are configured with FQDNs rather than IP addresses. https://www.cisco.com/c/en/us/td/docs/voice_ip_comm/expressway/config_guide/X14-0-2/cert_creation_use/exwy_b_certificate-creation-and-use-deployment-guide-x1402/exwy_b_certificate-creation-use-deployment-guide_chapter_01000.html#concept_BFDB31BC4989A5EB232AF2A85AD1727E
upvoted 1 times
...
jonycakes
1 year, 10 months ago
Answer D: When a TLS connection to Expressway mandates certificate verification, the certificate presented to the Expressway must be signed by a trusted CA in this list and there must be a full chain of trust (intermediate CAs) to the root CA. Source https://www.cisco.com/c/dam/en/us/td/docs/voice_ip_comm/expressway/config_guide/X8-9/Cisco-Expressway-Certificate-Creation-and-Use-Deployment-Guide-X8-9.pdf
upvoted 2 times
Omitted
1 year, 4 months ago
You can upload the server certificate with the full chain on it. The issue here seems to be the temporary cert. I think it is C
upvoted 2 times
...
...
khader09
3 years ago
I feel answer is C
upvoted 2 times
...
BangBang86
3 years, 2 months ago
The ExpC is using a temporary CA, and it needs a certificate signed by a CA (either private or public).
upvoted 4 times
...
Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...
exam
Someone Bought Contributor Access for:
SY0-701
London, 1 minute ago