Which three configurations are required for both IPsec VTI and crypto map-based VPNs?

Which three configurations are required for both IPsec VTI and crypto map-based VPNs?
(Choose three.)

Which three configurations are required for both IPsec VTI and crypto map-based VPNs?
(Choose three.)

A.
transform set

B.
ISAKMP policy

C.
ACL that defines traffic to encrypt

D.
dynamic routing protocol

E.
tunnel interface

F.
IPsec profile

G.
PSK or PKI trustpoint with certificate



Leave a Reply 0

Your email address will not be published. Required fields are marked *

fourteen + 14 =