To provide a secure cluster environment, an administrator will use VPN tunnels for communication between the nodes in a cluster.
What must be defined on the nodes for communication across the VPN tunnel?
A. Kerberos
B. SSL shared keys
C. Persistent IP Labels
D. Public key encryption