Chapter 8: Security Protocols
This chapter details the foundation of IPSec — the security protocols. IPSec leverages the se curity protocols to provide useful communication within the VPN. They are the workhorses that everything else is designed to support.
Security associations are established and maintained by the security protocol implemented. Security protocols are the heart of IPSec operations and their implementation determines transport or tunnel mode. Security protocols can be used in combination or nested to extend the VPN and its functionality.
There are two security protocols defined by IPSec — Authentication Header (AH) and Encapsulating Security Payload (ESP) — that are used to provide authentication, integrity, and, with ESP, ...