IT Certification CCIE,CCNP,CCIP,CCNA,CCSP,Cisco Network Optimization and Security Tips
IKE Policy Window
IKE Policy Window Step 9 Specify the encryption and authentication algorithms used by the IPSec VPN tunnel, as shown in Figure 15-35. 492 Chapter 15: Adaptive Security Device Manager