As you will find, the steps in configuring encryption are very similar regardless of which encryption scheme you use. Throughout this section, I refer to the proposed VPN setup in Figure 11.1.
As noted previously in the book, I treat 192.168.x.x as routable address space even though it is generally not considered routable per RFC1918.
You need the following information when planning a VPN based in FireWall-1:
Which hosts and/or networks the remote site ...