Table of Contents
Communication Between Network Layers
Data Flow
Security Requirements
Security at Application Layer
Security at Transport Layer
Security at Network Layer
Security at Data Link Layer
Goals of IPSec
IPSec Protocols
The IPSec Headers
What data to be protected?
Transport Mode
OS Integrated vs. BITS
Tunnel Mode
Nested Tunneling
Security Association (SA)
Unique Identification of SA
Creation and Deletion of SA
SA Parameters
SA Parameters (continued)
Selectors
Outbound IPSec Processing
Inbound IPSec Processing
|
Author: Agnes Hui Chan
Email: ahchan@ccs
|