User's Manual

26 C
HAPTER
1: I
NTRODUCTION
terminating device at the other end of the tunnel must be using the same
level and type of encryption. See Configuring Virtual Private Network
Serviceson page 123 for more details.
DUA1611-0AAA02.book Page 26 Thursday, August 2, 2001 4:01 PM