would it be correct to say that an IKE implementation
is ipsec compliant.

ie if a vpn tunnel is using IKE implementation then
one could say that the tunnel is ipsec compliant ?

if not what are the additional protocols or
implementations required to make the tunnel ipsec
compliant ?

__________________________________________________
Do you Yahoo!?
Yahoo! Tax Center - File online, calculators, forms, and more
http://tax.yahoo.com

=================================================
To set vacation, Out Of Office, or away messages,
send an email to [EMAIL PROTECTED]
in the BODY of the email add:
set fw-1-mailinglist nomail
=================================================
To unsubscribe from this mailing list,
please see the instructions at
http://www.checkpoint.com/services/mailing.html
=================================================
If you have any questions on how to change your
subscription options, email
[EMAIL PROTECTED]
=================================================

Reply via email to