Which four parameters must be defined in an IKE policy when creating an IPsec site-to-site VPN? (Choose four.)
A.
message encryption algorithm
B.
message integrity (hash) algorithm
C.
perfect forward secrecy
D.
peer authentication method
E.
key exchange parameters (DH group ID)
F.
interesting traffic