keying material for use with ISAKMP, and for other security associations such as AH and ESP
for the IPsec DOI.
3
.
6
.
1
I
P
S
e
c
3
.
6
.
1
I
P
S
e
c
The IPSec services can provide access control, connectionless integrity, data origin
authentication, rejection of replayed packets that is a form of partial sequence integrity, and
confidentiality by encryption. These objectives are met through the use of two traffic security
protocols, the Authentication Header (AH) and the Encapsulating Security Payload (ESP), and
through the use of cryptographic key management procedures and protocols.
P
o
l
i
c
y
P
o
l
i
c
y
To create a VPN IPSec policy, click the Policy Table option under the IPSec menu.
Refresh
Edit
Delete
Delete All
94
T
a
b
l
e
T
a
b
l
e
Refresh the page information.
Configure an entry. Clicking this button can guide you
accessing into editing page for that IPSec tunnel. For detailed
information, refer to the following section of For Default
Configuration.
Delete a designated entry.
Delete all entries in the table.
Vigor3300 Series User's Guide