 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
 |
| l |
Predominant
standard/ tech. to create VPN
|
|
|
| l |
Designed to
protect Internet (IP) traffic
|
|
|
| l |
Protects with:
|
|
|
|
l |
Authentication (AH: Authentication Header)
|
|
|
|
l |
Key Exchange (IKE: Internet Key Exchange)
|
|
|
|
l |
Encryption (ESP: Encapsulating Security Payload)
|
|
|
| l |
In another words:
|
|
|
|
l |
Making sure you
talk to who they say they really are
|
|
|
|
l |
Making sure you
have the key to open the message
|
|
|
|
l |
Making sure you
send your message in a way that only the
|
|
|
recipient
understands
|
|