For standard RFC (Request for Comments) complaint IKE VPN’s, a user’s authentication method
should be defined where?
A.
In the authentication tab of the user.
B.
In the Encryption tab of the firewall and the Authentication tab of the user.
C.
In the Encryption tab of the firewall and the Encryption tab of the user.
D.
In the Authentication tab on the firewall.
E.
In the Authentication tab of the firewall and the user.
Explanation:
: Since we are talking about RFC compliant IKE VPN´s we have to define the authentication at the
encryption tab of both, the user and the firewall. This is the practice recommended when talking
about RFC complaint IKE (Internet Key Exchange) VPN´s. See “RFC compliant VPN” at the online
documentation.