IPsec
Protects all upper-layer protocols.
Requires no modifications to applications.
But smart applications can take advantage of it.
Useful for host-to-host, host to gateway, and gateway-to-gateway.
Latter two used to build VPNs.
Previous slide
Next slide
Back to first slide
View graphic version