Protecting IPSec Configuration Properties
Make sure that a malicious user cannot obtain the IPSec configuration information. You can protect the configuration information by:
- Making configuration changes from the console of the terminal on which the SAE is running.
- Configuring SSH between the host from which you access the SAE and the host on which the SAE runs.
See the documentation for these systems for information about setting up SSH between the hosts.