A number of competing methods for integrating legacy remote accessuser authentication into IPsec have been proposed, resulting inconfusion as to which method(s) might be best for solving theproblems at hand. This document briefly compares these proposals inan effort to clarify the relative standing of each with respect tothe problem space and requirements.
展开▼