What is the first step in establishing an IPsec VPN?
- detection of interesting traffic
- negotiation of ISAKMP policies
- creation of a secure tunnel to negotiate a security association policy
- creation of an IPsec tunnel between two IPsec peer
Answers Explanation & Hints:
Before an IPsec tunnel can be configured, interesting traffic must be detected. Interesting traffic is defined by an access list permit statement. Once interesting traffic is detected, by matching the access list, IKE phase 1 negotiations can begin that will establish the tunnel. |