would it be correct to say that an IKE implementation is ipsec compliant. ie if a vpn tunnel is using IKE implementation then one could say that the tunnel is ipsec compliant ?
if not what are the additional protocols or implementations required to make the tunnel ipsec compliant ? __________________________________________________ Do you Yahoo!? Yahoo! Tax Center - File online, calculators, forms, and more http://tax.yahoo.com ================================================= To set vacation, Out Of Office, or away messages, send an email to [EMAIL PROTECTED] in the BODY of the email add: set fw-1-mailinglist nomail ================================================= To unsubscribe from this mailing list, please see the instructions at http://www.checkpoint.com/services/mailing.html ================================================= If you have any questions on how to change your subscription options, email [EMAIL PROTECTED] =================================================
