I understand that, theoretically, Checkpoint and PIX should have no problems
establishing (and keeping) an IPSec tunnel between each other, but what are
the caveats? Do certain versions of one vendor not work with a specific
version of the other?
Can anyone point me to some documentation that points out the problems? Or,
better yet, has anyone had problems that they can document for me?
Thanks,
Ari
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]