Which IPsec protocol would you use to provide authentication, integrity checking, and confidentiality to IP packets?

Which IPsec protocol would you use to provide authentication, integrity checking, and confidentiality to IP packets?

Which IPsec protocol would you use to provide authentication, integrity checking, and confidentiality to IP packets?

A.
ISAKMP

B.
ESP

C.
AH

D.
IKE

Explanation:
content\166040\plo_content\ORG1114\COURSE166040\enus_011425\lsn_06\tpc_f\enus_011425_06f.xml:
IPsec uses four main protocols to create a security framework: Internet Key Exchange (IKE), which makes IPsec more scalable by simplifying the key management; Internet Security Association and Key Management Protocols (ISAKMP), which is the general framework for exchanging keys and is sometimes used as almost a synonym for IKE; Encapsulating Security Protocol (ESP), which is used to provide authentication, integrity checking, and confidentiality to IP packets; and Authentication Header (AH), which is used to provide authentication and integrity checking for IP packets.
You need to know a little bit about each of these, since various choices are available when you configure an IPsec VPN.



Leave a Reply 0

Your email address will not be published. Required fields are marked *