Trusted Extensions Configuration and Administration

Exit Print View

Updated: July 2014
 
 

Configuring Labeled IPsec

The following task map describes tasks that are used to add labels to IPsec protections.

Table 16-1  Configuring Labeled IPsec Task Map
Task
Description
For Instructions
Use IPsec with Trusted Extensions.
Adds labels to IPsec protections.
Use IPsec with Trusted Extensions across an untrusted network.
Tunnels labeled IPsec packets across an unlabeled network.