Chapter 6
Configuring IPSec (continued)
Figure 6-15
Configuring IPSec