While still on the phone with the end administrator, it is wise to verify your encryption policy to include:

  • the peer router's name
  • the encryption policy that will be used
  • the IP addresses of the hosts that will be encrypting packets
  • the protocol type that is to be encrypted