What is needed to define interesting traffic in the creation of an IPsec tunnel?
- access list
- security associations
- transform set
- hashing algorithm
Answers Explanation & Hints: In order to bring up an IPsec tunnel, an access list must be configured with a permit statement that will identify interesting traffic. Once interesting traffic is detected by matching the access list, the tunnel security associations can be negotiated.