摘要:
see:http://book.soundonair.ru/cisco/ch13lev1sec4.htmlIPsec Negotiation Using the IKE ProtocolIKE negotiates IPsec tunnels between two IPsec peers. This negotiation can be done using a combination of m... 阅读全文
posted @ 2009-09-21 23:24
岌岌可危
阅读(1446)
评论(0)
推荐(0)

浙公网安备 33010602011771号