[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: IKE and Legacy A.S




ISAKMP configuration method and XAUTH drafts are implemented
by good number of vendors to provide remote access and legacy
authentication. You can find these standards in www.vpnc.org.

Srini


On Mon, 6 May 2002, Laurent Fabre wrote:

> 
> Hi,
> 
> I'm currently studying the support of legacy authentication system
> for our products. During my researches i came accross the following drafts :
> 
> 	- draft-zegman-ike-hybrid-auth
> 	- draft-beaulieu-ike-xauth
> 	- draft-ietf-ipsra-pic
> 
> Hopefully these are the only proposals for legacy AS support,
> only the third seems to be revelant as the two others are out-of-date,
> if not please correct me.
> 
> Did anyone try to use PIC/EAP in his IKE implementation and would
> give feedback ?
> 
> Best regards,
> 
> 

-- 
Srinivasa Rao Addepalli
Intoto Inc.
3160, De La Cruz Blvd #100
Santa Clara, CA
USA
Ph: 408-844-0480 x317