What should be taken into consideration when designing IPsec networks using Authentication Header (AH)?

What should be taken into consideration when designing IPsec networks using Authentication
Header (AH)?

What should be taken into consideration when designing IPsec networks using Authentication
Header (AH)?

A.
NAT

B.
transform set

C.
crypto maps

D.
ISAKMP



Leave a Reply 0

Your email address will not be published. Required fields are marked *