mip6-8----Page:5
1
2
3
4
5
6
Requirements on EAP methods
(*) Only if the secret for bootstrapping the IPsec SA is not
derived from the EAP key hierarchy
PPT Version