What must happen before an IPsec tunnel can be established?
a. Security parameters have to be negotiated and publicly agreed upon by both ends.
b. IKE Phase 1 is a phase where both network nodes authenticate each other and set up an IKE SA. IKE Phase 2 uses the plain-text channel
established in phase 1 to negotiate the unidirectional IPsec SAs, inbound and outbound, to set up the IPsec tunnel.
c. IKE Phase 1 is a phase where one network node authenticates the other and sets up an IKE SA. IKE Phase 2 uses the open channel established in phase 1 to negotiate the unidirectional IPsec SAs, inbound and outbound, to set up the IPsec tunnel.
d. Security parameters have to be negotiated and agreed upon by both ends.
d. Security parameters have to be negotiated and agreed upon by both ends.
You might also like to view...
In object-oriented programming, the ___________ is more general than classes related to it.
a. container class b. default design c. base class d. derived class
What is the percent change from January to February?
Use the data in the following table to answer the following problems. Determine from the wording of the problem which value is v1 and which is v2. Compute percent change, rounding decimal answers to two places. Express your result in a sentence stating how much the second value is less than or greater than the first value. For example: "August sales are 50 percent less than July sales." ![15183|207x135](upload://sj39d63JnuabzuIhjj8px6Ve1gE.jpeg)