Which of the following actions take place in IKE Phase 2 with Perfect Forward Secrecy disabled?

Which of the following actions take place in IKE Phase 2 with Perfect Forward Secrecy disabled?

Which of the following actions take place in IKE Phase 2 with Perfect Forward Secrecy disabled?

A.
Symmetric IPsec keys are generated.
B. Each Security Gateway generates a private Diffie-Hellman (DH) key from random pools.

C.
The DH public keys are exchanged.

D.
Peers authenticate using certificates or preshared secrets.



Leave a Reply 2

Your email address will not be published. Required fields are marked *