Deb Cooley writes:
> Section 4.4.2: Is there a circumstance where distributing both ESP and AH
> policies for the same set of Traffic Selectors would be sensible? If not,
> should this be MUST NOT?
I think this is aligning with the Cryptographic Algorithm
Implementation Requirements and Usage Gu
Hi Valery, hi Brian,
While looking at the latest version of draft-ietf-ipsecme-g-ikev2, I was
wondering if a public implementation is available? It would be interesting to
have a look at the implementation to get a better impression regarding the take
over of enhancements done for GDOI into G-I