When using IKE in a Firewall-to-Firewall VPN, ____________ is used to manage session keys, encryption method and data integrity.

When using IKE in a Firewall-to-Firewall VPN, ____________ is used to manage session keys,
encryption method and data integrity.

When using IKE in a Firewall-to-Firewall VPN, ____________ is used to manage session keys,
encryption method and data integrity.

A.
UDP

B.
RDP

C.
ICMP

D.
FTP

E.
RWS

Explanation:

: RDP was used for FWZ not IKE which uses UDP to manage session keys. FWZ is no longer
supported by NG (since FP1).



Leave a Reply 0

Your email address will not be published. Required fields are marked *