The IKE protocol is used to set up an SA for IPsec automatic negotiation. Identity authentication can be performed when the IP address of the initiator changes dynamically.
A. True
B. False
The IKE protocol is used to set up an SA for IPsec automatic negotiation. Identity authentication can be performed when the IP address of the initiator changes dynamically.
A. True
B. False