30.01.2015 Views

CSC 774 -- Network Security - Dr. Peng Ning

CSC 774 -- Network Security - Dr. Peng Ning

CSC 774 -- Network Security - Dr. Peng Ning

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Review of IPsec (Cont’d)<br />

• Two Protocols (Mechanisms)<br />

– Authentication Header (AH)<br />

– Encapsulating <strong>Security</strong> Payload (ESP)<br />

Computer Science<br />

<strong>Dr</strong>. <strong>Peng</strong> <strong>Ning</strong> <strong>CSC</strong> <strong>774</strong> <strong>Network</strong> <strong>Security</strong> 7<br />

IPsec Architecture (Cont’d)<br />

• Can be implemented in<br />

– Host or gateway<br />

• Can work in two Modes<br />

– Tunnel mode<br />

– Transport mode<br />

Computer Science<br />

<strong>Dr</strong>. <strong>Peng</strong> <strong>Ning</strong> <strong>CSC</strong> <strong>774</strong> <strong>Network</strong> <strong>Security</strong> 8

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!