What should be taken into consideration when designing IPsec networks using Authentication Header (AH)?
A. NAT
B. transform set
C. crypto maps
D. ISAKMP
What should be taken into consideration when designing IPsec networks using Authentication Header (AH)?
A. NAT
B. transform set
C. crypto maps
D. ISAKMP