What is needed to define interesting traffic in the creation of an IPsec tunnel?

What is needed to define interesting traffic in the creation of an IPsec tunnel?

  • access list
  • security associations
  • transform set
  • hashing algorithm
    Answers Explanation & Hints:

    In order to bring up an IPsec tunnel, an access list must be configured with a permit statement that will identify interesting traffic. Once interesting traffic is detected by matching the access list, the tunnel security associations can be negotiated.​

Leave a comment