When you enable IPsec, you can use one of the default
IPsec policies built-in. The IPsec policy is used to determine the type of
traffic to be encrypted and the method to be used to encrypt the traffic. The
three default IPsec policies are as follows:
·
Client
(respond only) If
asked to communicate securely, this system will respond by using IPsec, but it
will never request or initiate secure communication.
·
Server
(request security) When
enabled, this system will request to use IPsec to secure traffic; if the remote
system does not support IPsec, the system will communicate insecurely.
·
Secure
Server (require security) This
system will communicate with a remote system only if the remote system supports
and uses IPsec.
No comments:
Post a Comment