When configuring an IPsec VPN, what is used to define the traffic that is sent through the IPsec tunnel and protected by the IPsec process?
- crypto map
- crypto ACL
- ISAKMP policy
- IPsec transform set
Exam with this question: CCNA Security Chapter 8 Exam (CCNAS v1.2)
Please login or Register to submit your answer