Oakley key determination protocol

1 Why does ESP include a padding field?

2 What are the basic approaches to bundling SAs?

3 What are the roles of the Oakley key determination protocol and ISAKMP in IPsec

1 Give examples of applications of IPsec.

2 What services are provided by IPsec?

3 What parameters identify an SA and what parameters characterize the nature of a particular SA?

4 What is the difference between transport mode and tunnel mode?

5 What is a replay attack?


Looking for help with your homework?
Grab a 30% Discount and Get your paper done!

30% OFF
Turnitin Report
Title Page
Place an Order

Calculate your paper price
Pages (550 words)
Approximate price: -