问题:
[多选题]7. What are the two IKE methods used by the IPsec protocol for secure tunnel negotiation? (Choose all that apply.) IPSec协议使用哪两个IKE方法来保护隧道协商的信息?(选出所有满足条件的答 案)
A.IKEv1
B.IKE-New
C.IKEv2
D.IKEng
答案解析:
您可能感兴趣的问题
- 20. 什么命令可以挂载远程Microsoft共享目录?
- 11、What is the recommended value when setting the MTU for a connection?当为一个连接设置MTU时,推荐的数值是什么?
- 30、 Which of the following are available actions used for NetFlow flow information creation? (Choose
- 28、 Which of the following are available automatic certificate-retrieval methods using the AnyConnec
- 45、 Which of the following is not an available method of HA for use with VPN connectivity?当和VPN连接一起使
- 15. When configuring external group polices, which AAA protocols or servers can you use for authoriz
- 22. When configuring RSA key pairs, which modulus values are available on the ASA device? (Choose al
- 19. 如果要检测与排除QoS故障问题,那么就需要查看接口上配置的QoS策略并确定哪些队列已经填满 数据包和正在丢弃数据包。下面哪条命令可以显示上述信息?
- 23. 作为最低要求,为了支持客户端的远程连接,必须在PPPoE服务器上配置哪条命令?
- 31. PE在收到其他PE发送来的IBGP更新之后,由下面哪一项控制将这些路由添加到哪个VRF中?