A company has instituted a VPN to allow remote users to connect to the office. As time progresses
multiple security associations are created with each association being more secure. Which of the
following should be implemented to automate the selection of the BEST security association for
each user?
A.
IKE
B.
AES
C.
SHA
D.
3DES