Go to main content

Trusted Extensions Configuration and Administration

Exit Print View

Updated: December 2017

Configuring Labeled IPsec

The following task map describes tasks that are used to add labels to IPsec protections.

Table 24  Configuring Labeled IPsec Task Map
For Instructions
Use IPsec with Trusted Extensions.
Adds labels to IPsec protections.
Use IPsec with Trusted Extensions across an untrusted network.
Tunnels labeled IPsec packets across an unlabeled network.