Which four parameters must be defined in an IKE policy when creating an IPsec site-to-site VPN?

Which four parameters must be defined in an IKE policy when creating an IPsec site-to-site VPN? (Choose four.)

Which four parameters must be defined in an IKE policy when creating an IPsec site-to-site VPN? (Choose four.)

A.
message encryption algorithm

B.
message integrity (hash) algorithm

C.
perfect forward secrecy

D.
peer authentication method

E.
key exchange parameters (DH group ID)

F.
interesting traffic



Leave a Reply 0

Your email address will not be published. Required fields are marked *