• Post author:
  • Post category:Blog
  • Reading time:1 mins read
  • Post last modified:June 12, 2024

Which method is used to identify interesting traffic needed to create an IKE phase 1 tunnel?

  • transform sets
  • a permit access list entry
  • hashing algorithms
  • a security association
Subscribe
Notify of
guest
0 Comments
Newest
Oldest Most Voted
Inline Feedbacks
View all comments