While still on the phone with the end administrator, it is wise to verify your encryption policy to include:
- the peer router's name
- the encryption policy that will be used
- the IP addresses of the hosts that will be encrypting packets
- the protocol type that is to be encrypted
|