Changes

no edit summary
Line 17: Line 17:  
There will be two IPsec configuration schemes presented. Although the second scheme is only an extension of the first one. Therefore, to configure the second scheme, you will have to configure the first as well.
 
There will be two IPsec configuration schemes presented. Although the second scheme is only an extension of the first one. Therefore, to configure the second scheme, you will have to configure the first as well.
   −
'''configuration scheme 1''':
+
'''Configuration scheme 1''':
    
[[File:Configuration examples ipsec scheme 1.png]]
 
[[File:Configuration examples ipsec scheme 1.png]]
Line 23: Line 23:  
The figure above above depicts two RUTxxx routers (RUT1 and RUT2) connected by an IPsec tunnel via the Internet.
 
The figure above above depicts two RUTxxx routers (RUT1 and RUT2) connected by an IPsec tunnel via the Internet.
 
----
 
----
'''configuration scheme 2''':
+
'''Configuration scheme 2''':
    
[[File:Configuration examples ipsec scheme 2.png]]
 
[[File:Configuration examples ipsec scheme 2.png]]

Navigation menu