Which of the following actions take place in IKE Phase 2 with Perfect Forward Secrecy disabled?
A.
Symmetric IPsec keys are generated.
B. Each Security Gateway generates a private Diffie-Hellman (DH) key from random pools.
C.
The DH public keys are exchanged.
D.
Peers authenticate using certificates or preshared secrets.
A)
A