Click the Exhibit button.

Referring to the exhibit, what are two recommended steps to be set on the perimeter device to monitor IPsec tunnels to a Netskope data plane? (Choose two.)
To monitor IPsec tunnels to a Netskope data plane, it is essential to ensure the stability and responsiveness of the tunnels. The recommended steps involve enabling monitoring mechanisms that detect and respond to tunnel failures. Here's a detailed explanation of the two recommended steps:
Enable IKE Dead Peer Detection (DPD) for each tunnel:
Implementation: Configure DPD in the IPsec settings of the perimeter device. This ensures that if the Netskope data plane is unreachable, the tunnel is automatically terminated and re-negotiated.
Send ICMP requests to the Netskope location's Probe IP:
Implementation: Set up regular ICMP requests (ping) from the perimeter device to the Netskope Probe IPs. This allows for continuous monitoring of the tunnel's health and immediate detection of connectivity issues.
REST API v2 Overview - Netskope Knowledge Portal
Using the REST API v2 dataexport Iterator Endpoints - Netskope Knowledge Portal
Using the REST API v2 UCI Impact Endpoints - Netskope Knowledge Portal
Royal
2 months agoLucina
2 months agoRobt
2 months agoElly
3 months agoBeckie
3 months agoEdison
3 months agoDenae
3 months agoKarma
4 months agoNarcisa
4 months agoKanisha
4 months agoEnola
4 months agoAlba
4 months agoIola
5 months agoBethanie
5 months agoKrystina
7 months agoElfrieda
7 months agoLayla
7 months agoDaron
7 months agoErnest
7 months agoBarney
7 months agoSherita
8 months agoQuentin
6 months agoTu
7 months agoEulah
7 months agoKallie
7 months agoTandra
8 months agoAngella
8 months agoJames
8 months ago