Click the Exhibit button.
Referring to the exhibit, what are two recommended steps to be set on the perimeter device to monitor IPsec tunnels to a Netskope data plane? (Choose two.)
To monitor IPsec tunnels to a Netskope data plane, it is essential to ensure the stability and responsiveness of the tunnels. The recommended steps involve enabling monitoring mechanisms that detect and respond to tunnel failures. Here's a detailed explanation of the two recommended steps:
Enable IKE Dead Peer Detection (DPD) for each tunnel:
Implementation: Configure DPD in the IPsec settings of the perimeter device. This ensures that if the Netskope data plane is unreachable, the tunnel is automatically terminated and re-negotiated.
Send ICMP requests to the Netskope location's Probe IP:
Implementation: Set up regular ICMP requests (ping) from the perimeter device to the Netskope Probe IPs. This allows for continuous monitoring of the tunnel's health and immediate detection of connectivity issues.
REST API v2 Overview - Netskope Knowledge Portal
Using the REST API v2 dataexport Iterator Endpoints - Netskope Knowledge Portal
Using the REST API v2 UCI Impact Endpoints - Netskope Knowledge Portal
Ernest
3 days agoBarney
4 days agoSherita
7 days agoTandra
7 days agoAngella
16 days agoJames
19 days ago