[Contents] [Prev] [Next] [Index] [Report an Error] [No Frames]


Protecting IPSec Configuration Properties

Make sure that a malicious user cannot obtain the IPSec configuration information. You can protect the configuration information by:

See the documentation for these systems for information about setting up SSH between the hosts.


[Contents] [Prev] [Next] [Index] [Report an Error] [No Frames]