What is negotiated in the establishment of an IPsec tunnel between two IPsec hosts during IKE Phase 1?
- interesting traffic
- ISAKMP SA policy
- transform sets
- DH groups
Explanation: Establishing an IPsec tunnel involves five steps:
Detection of interesting traffic defined by an ACL
IKE Phase 1 in which peers negotiate ISAKMP SA policy
IKE Phase 2 in which peers negotiate IPsec SA policy
Creation of the IPsec tunnel
Termination of the IPsec tunnel
Exam with this question: CCNA Security Certification Practice Exam Answers
Exam with this question: CCNA Security Final Exam Answers
Exam with this question: Module 19: Quiz – Implement Site-to-Site IPsec VPNs Network Security
Please login or Register to submit your answer