Configuration of Tunnel Mode Ipsec Endpoint Parameters
draft-ohara-ipsecparam-00
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Author | John T. O'Hara | ||
Last updated | 1997-11-26 | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This document describes the assignment of configuration parameters to IPsec tunnel mode client endpoints. Single user computers that are connecting into corporations via Internet Service Providers, ISP's, using Tunnel mode IPsec may need to have configuration information supplied to them, such as inner ip address, DNS server addresses, WINS server addresses, etc. This document describes a method utilized by New Oak Communications to pass these parameters between it's Extranet Access Switch and it's IPsec client software.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)