Which two actions occur during IKE Phase 1?

Which two actions occur during IKE Phase 1? (Choose two.)

Which two actions occur during IKE Phase 1? (Choose two.)

A.
A secure channel is established between two peers.

B.
The proxy ID is used to identify which security association is referenced for the VPN.

C.
The Diffie-Hellman key exchange algorithm establishes a shared key for encryption.

D.
The security association is identified by a unique security parameter index value.



Leave a Reply 1

Your email address will not be published. Required fields are marked *


rpgghost

rpgghost

http://www.ciscopress.com/articles/article.asp?p=24833&seqNum=6

Authenticates and protects the identities of the IPSec peers

Negotiates a matching IKE SA policy between peers to protect the IKE exchange

Performs an authenticated Diffie-Hellman exchange with the end result of having matching shared secret keys

Sets up a secure tunnel to negotiate IKE phase two parameters