26 C
HAPTER
1: I
NTRODUCTION
terminating device at the other end of the tunnel must be using the same
level and type of encryption. See “Configuring Virtual Private Network
Services” on page 123 for more details.
DUA1611-0AAA02.book Page 26 Thursday, August 2, 2001 4:01 PM
Comentários a estes Manuais