What is the next step in the establishment of an IPsec VPN after IKE Phase 1 is complete?
- negotiation of the ISAKMP policy
- negotiation of the IPsec SA policy
- detection of interesting traffic
- authentication of peers
Explanation: Establishing an IPsec tunnel involves five steps:
detection of interesting traffic defined by an ACL
IKE Phase 1 in which peers negotiate ISAKMP SA policy
IKE Phase 2 in which peers negotiate IPsec SA policy
Creation of the IPsec tunnel
Termination of the IPsec tunnel
Exam with this question: CCNA Security Practice Final Exam Answers
Exam with this question: CCNA Security Certification Practice Exam Answers
Exam with this question: Network Security Course Final Exam Answers
Please login or Register to submit your answer