content











Cisco Secure Virtual Private Networks








6.2
Task
1Preparing for IKE and IPSec



6.2.4
IKE
policy example





You should determine IKE policy details for each peer
before configuring IKE. The figure to the left shows a summary of IKE policy
details that will be configured in examples and in labs for this
chapter. The authentication method of pre-shared keys is covered in
this chapter.
 











Wyszukiwarka

Podobne podstrony:
content
content
content
content
content
content
content
content
content
function domnode get content
content
content
content
content
content
content

więcej podobnych podstron