Which statement best describes configuring access control lists to control Telnet traffic destined to the router itself?
You work as a network engineer, do you know an IPsec tunnel is negotiated within the protection of which type of tunnel?