mip6-8----Page:5
1  2  3  4  5  6 

Requirements on EAP methods
(*) Only if the secret for bootstrapping the IPsec SA is not
derived from the EAP key hierarchy
PPT Version