What is needed to define interesting traffic in the creation of an IPsec tunnel?
- security associations
- hashing algorithm
- access list
- transform set
Explanation: In order to bring up an IPsec tunnel, an access list must be configured with a permit statement that will identify interesting traffic. Once interesting traffic is detected by matching the access list, the tunnel security associations can be negotiated.
Exam with this question: CCNA Security Chapter 8 Exam Answers
Exam with this question: Checkpoint Exam: VPNs Group Exam Answers
Please login or Register to submit your answer