content











Cisco Secure Virtual Private Networks








8.2
Task
1Preparing for IPSec



8.2.4
IKE
policy example





You should determine IKE policy
details for each peer before configuring IKE. The figure to the left shows a
summary of IKE policy details that will be configured in examples
and in labs for this chapter. The authentication method of
pre-shared keys is covered in this chapter.
 










Wyszukiwarka

Podobne podstrony:
content
content
content
content
content
content
content
content
content
function domnode get content
content
content
content
content
content
content

więcej podobnych podstron