7

Configuring the Primary and

 

Secondary Security Server

This chapter describes the procedure to configure the primary and secondary security server.

Chapter 7

95