This module describes how connection security rules can be used to provide additional security to protect data transmitted across networks.
After completing this module, you will be able to:
- Describe the purpose and functionality of IPsec.
- Describe how to configure IPsec.
- Describe connection security rules.
- Explain authentication options.
- Monitor connections.