
S E C T I O N 8 W E B G U I S Y S T E M
64
encrypted and/or authenticated. The following parameters on this form are used to uniquely
identify an SA and match it to a packet: These are some examples:
• Security Policy Index (SPI)
• Destination IP address and port
• IPsec protocol, ESP or AH
Figure 29. Manual IPsec : Security Association Edit Screen
Comentarios a estos manuales