A network administrator is troubleshooting an issue with Phase 2 of an IPSec VPN tunnel. The administrator determines that the lifetime needs to be changed to match the peer.
the mistakes are made intentionally to prevent the website from being shut down. They rely on the users to discuss and provide the actual correct answers :)
B for phase 2 ....... - For securing communication across the VPN tunnel, the firewall requires IKE and IPSec cryptographic profiles for completing IKE phase 1 and phase 2 negotiations, respectively.
B:
Details for both phases of IKE:
The **IKE crypto profile** is used to set up the encryption and authentication algorithms used for the key exchange process in IKE Phase 1, and lifetime of the keys, which specifies how long the keys are valid. To invoke the profile, you must attach it to the IKE Gateway configuration.
The **IPSec crypto profile** is invoked in IKE Phase 2. It specifies how the data is secured within the tunnel when Auto Key IKE is used to automatically generate keys for the IKE SAs.
A voting comment increases the vote count for the chosen answer by one.
Upvoting a comment with a selected answer will also increase the vote count towards that answer by one.
So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.
Marshpillowz
11 months, 2 weeks agoSammy3637
1 year, 1 month agotolis2007
1 year, 10 months ago62c930f
1 month, 3 weeks agomohr22
1 year, 11 months agodjedeen
1 year, 12 months ago19216855
2 years agoconfusion
2 years, 1 month agomz101
2 years, 1 month agochrisy042
2 years, 1 month ago