|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: Security Use Requirements>I think there is a much easier way than the two methods you describe below. >If the iSCSI authentication is taking place using the SA negotiated by IKE, >then you have an implicit relationship between IKE and iSCSI authentication, >right? That would be fine if there is only one iSCSI authentication per IKE QM SA. Is that realistic?
Home Last updated: Tue Sep 04 01:05:32 2001 6315 messages in chronological order |