Configuring Labeled IPsec
The following task map describes tasks that are used to add labels to
IPsec protections.
Table 24 Configuring Labeled IPsec Task Map
| | |
Use IPsec with Trusted Extensions.
| Adds labels to IPsec protections.
|
|
Use IPsec with Trusted Extensions across an untrusted network.
| Tunnels labeled IPsec packets across an unlabeled network.
|
|
|