|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] RE: Security Use RequirementsI think there is only one per connection. But by carefull handling at both ends the connection should be able to share the same context. Regards, Julo "Bernard Aboba" <aboba@internaut.com> on 09/02/2001 20:39:57 Please respond to "Bernard Aboba" <aboba@internaut.com> To: "Joshua Tseng" <jtseng@NishanSystems.com> cc: ips@ece.cmu.edu Subject: RE: Security Use Requirements >I think there is a much easier way than the two methods you describe below. >If the iSCSI authentication is taking place using the SA negotiated by IKE, >then you have an implicit relationship between IKE and iSCSI authentication, >right? That would be fine if there is only one iSCSI authentication per IKE QM SA. Is that realistic?
Home Last updated: Tue Sep 04 01:05:32 2001 6315 messages in chronological order |