Watch this video on YouTube
Which of the following security methods does Consul use to secure gossip communication throughout the cluster?