Which two configuration elements are required for a policy-based VPN? (Choose two.)
A.
IKE gateway
B.
secure tunnel interface
C.
security policy to permit the IKE traffic
D.
security policy referencing the IPsec VPN tunnel
Which two configuration elements are required for a policy-based VPN? (Choose two.)
Which two configuration elements are required for a policy-based VPN? (Choose two.)
A.
IKE gateway
B.
secure tunnel interface
C.
security policy to permit the IKE traffic
D.
security policy referencing the IPsec VPN tunnel
http://www.juniper.net/techpubs/en_US/junos12.1/topics/concept/vpn-security-overview.html
In policy-based VPNs, a tunnel is treated as an object that, together with source, destination, application, and action, constitutes a tunnel policy that permits VPN traffic.
= security policy referencing the IPsec VPN tunnel