Which of the following actions take place in IKE Phase 2 with Perfect Forward Secrecy disabled?
A.
The DH public keys are exchanged.
B.
Peers authenticate using certificates or preshared secrets.
C.
Symmetric IPsec keys are generated.
D.
Each Security Gateway generates a private Diffie-Hellman (DH) key from random pools.