Which of the following actions take place in IKE Phase 2 with Perfect Forward Secrecy disabled?
How many packets does the IKE exchange use for Phase 1 Main Mode?
Which of the following is a viable consideration when determining Rule Base order?
Certificates for Security Gateways are created during a simple initialization from _____________.