Watch this video on YouTube
Which of the following IPsec components uses the Diffie–Hellman algorithm to create a master key and a key that is specific to each session in IPsec data transfer?