NEGOTIATION OF SECURITY PROTOCOLS AND PROTOCOL ATTRIBUTES IN SECURE COMMUNICATIONS ENVIRONMENT
摘要
A first endpoint attempts to establish an IPsec tunnel with a second endpoind. If the second endpoind does not support IPsec, a new tunnel is formed using another security protocol.