A system administrator is configuring a site-to-site VPN tunnel.
Which of the following should be configured on the VPN concentrator during the IKE phase?
Click on the arrows to vote for the correct answer
A. B. C. D.C.
The Internet Key Exchange (IKE) is the protocol used to establish a secure communication channel between two parties, in this case, the VPN concentrator and the remote VPN gateway. During the IKE phase, the following key aspects should be configured on the VPN concentrator:
A. RIPEMD: This is a cryptographic hash function that is used to ensure the integrity of the data exchanged between the two parties during the IKE phase. However, it is not directly related to the establishment of the VPN tunnel.
B. ECDHE: This is a key exchange protocol that is used to establish a shared secret between the two parties during the IKE phase. This shared secret is then used to encrypt and decrypt the data exchanged between the two parties. ECDHE is one of the most secure key exchange protocols available today and is highly recommended.
C. Diffie-Hellman: This is another key exchange protocol that is used to establish a shared secret between the two parties during the IKE phase. Diffie-Hellman is also highly secure and is widely used in VPNs.
D. HTTPS: This is a protocol used for secure communication over the web. It is not directly related to the establishment of the VPN tunnel.
Therefore, the correct answer is either B or C, depending on which key exchange protocol is preferred or supported by the VPN concentrator and the remote VPN gateway.