CSC 774 -- Network Security - Dr. Peng Ning
CSC 774 -- Network Security - Dr. Peng Ning
CSC 774 -- Network Security - Dr. Peng Ning
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Review of IPsec (Cont’d)<br />
• Two Protocols (Mechanisms)<br />
– Authentication Header (AH)<br />
– Encapsulating <strong>Security</strong> Payload (ESP)<br />
Computer Science<br />
<strong>Dr</strong>. <strong>Peng</strong> <strong>Ning</strong> <strong>CSC</strong> <strong>774</strong> <strong>Network</strong> <strong>Security</strong> 7<br />
IPsec Architecture (Cont’d)<br />
• Can be implemented in<br />
– Host or gateway<br />
• Can work in two Modes<br />
– Tunnel mode<br />
– Transport mode<br />
Computer Science<br />
<strong>Dr</strong>. <strong>Peng</strong> <strong>Ning</strong> <strong>CSC</strong> <strong>774</strong> <strong>Network</strong> <strong>Security</strong> 8