Network Trace of a ping in IPSEC tunnel
If you perform a network trace of a ping going through an IPSec/3-DES tunnel, it would be true with respect to the appearance of a tunneled/encrypted packets, that the same key
Information Security Notes
If you perform a network trace of a ping going through an IPSec/3-DES tunnel, it would be true with respect to the appearance of a tunneled/encrypted packets, that the same key