Which method is used to identify interesting traffic needed to create an IKE phase 1 tunnel?

IT Questions BankCategory: CCNA SecurityWhich method is used to identify interesting traffic needed to create an IKE phase 1 tunnel?

Which method is used to identify interesting traffic needed to create an IKE phase 1 tunnel?

  • transform sets
  • a permit access list entry
  • hashing algorithms
  • a security association

Exam with this question: Network Security Final Exam Answers

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x