How many messages does Internet Key Exchange use to negotiate SA characteristics when it runs in aggressive mode?
What three major tasks are performed by a Designated Intermediate System in an ISIS pseudonode environment?