19.4. Choice of algorithms
Chapter 19. IPSec
19.4. Choice of algorithms
Both authentication and encryption allow a choice of algorithms
Note
This section of the manual not complete