• Post author:
  • Post category:Blog
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

Which action do IPsec peers take during the IKE Phase 2 exchange?

  • negotiation of IPsec policy
  • negotiation of IKE policy sets
  • verification of peer identity
  • exchange of DH keys
    Answers Explanation & Hints:

    The IKE protocol executes in two phases. During Phase 1 the two sides negotiate IKE policy sets, authenticate each other, and set up a secure channel. During the second phase IKE negotiates security associations between the peers.

Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments