Answer – C, D, E and F
IPSec is designed to provide authentication, integrity, and confidentiality of the data that is being transmitted. IPSec operates at the network layer of the OSI model. Hence, it only protects the data that is in transit over the internet. For the full security of the data transmission, it is essential that both the sender and receiver need to be IPSec-aware.
See the diagram of this scenario:
Option A is incorrect because (a) IPSec operates at the network layer of the OSI model. Hence, it only protects the data that is in transit ( encryption of data in transit ONLY) over the internet, and (b) both the source and the destination (client and server) may not be IPSec aware.
Option B is incorrect because the identity authentication of the origin of the data has to be done at the application layer, not the network layer.
Option C is CORRECT because the data that is transiting via the IPSec tunnel is encrypted.
Option D is CORRECT because IPSec protects the data in transit over the internet (fundamental responsibility of IPSec tunnel).
Option E is CORRECT because, in this scenario, it is a pre-requisite to have the Peer identity authentication between VP gateway and customer gateway for implementing an IPsec VPN tunnel. The IPSec tunnel is established between the VP Gateway (VPG) and Customer Gateway (CGW) whose identity gets authenticated during the IPSec tunnel setup.
Since it is a pre-requisite even for establishing this connection we cannot term that as an objective that we have achieved via IPSec implementation.
Option F is CORRECT because - as mentioned earlier - the integrity of the data that is transiting via the IPSec tunnel is always preserved (fundamental responsibility of IPSec tunnel).
For more information on IPSec tunnel, please refer to
http://techgenix.com/securing_data_in_transit_with_ipsec/
The below link provides an article on the general working of an IPSec tunnel which outlines the advantages of an IPSec tunnel which includes:
http://www.firewall.cx/networking-topics/protocols/870-ipsec-modes.html