You could do that using an ipsec policy that uses permit and block filter actions
instead of negotiate if you do not need to encrypt or insure integrity of data via
ESP and/or AH. -- Steve
You could do that using an ipsec policy that uses permit and block filter actions
instead of negotiate if you do not need to encrypt or insure integrity of data via
ESP and/or AH. -- Steve