• Post author:
  • Post category:Blog
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

What is the next step in the establishment of an IPsec VPN after IKE Phase 1 is complete?

  • authentication of peers
  • negotiation of the ISAKMP policy
  • detection of interesting traffic
  • negotiation of the IPsec SA policy
    Answers Explanation & Hints:

    Establishing an IPsec tunnel involves five steps:
    detection of interesting traffic defined by an ACL
    IKE Phase 1 in which peers negotiate ISAKMP SA policy
    IKE Phase 2 in which peers negotiate IPsec SA policy
    Creation of the IPsec tunnel
    Termination of the IPsec tunnel

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments