You are asked to design security policies for your corporate network where policy-based VPNs will be used.
In this scenario, which three statements for a traffic match are true? (Choose three.)
A. The policy action is always permit.
B. A VPN tunnel is indirectly referenced by a route that points to a specific tunnel interface.
C. The security policy sets up the IPsec tunnel.
D. Tunnels are generated when traffic matches a policy.
E. The policy refers to the remote IKE gateway.