What four events occur when one IPsec-compliant computer connects to another?

What will be an ideal response?

1. The IPsec driver and ISAKMP retrieve the IPsec policy settings.
2. ISAKMP negotiates between hosts, based on their policy settings, and builds an SA between them.
3. The Oakley protocol generates a master key to secure IPsec communication.
4. Based on the security policy established for the session, the IPsec driver monitors, filters, and secures network traffic.

Computer Science & Information Technology

You might also like to view...

How many computers was the bot-herder 0x80 said to control?

A) 20,000 in more than 20 countries B) 20,000 in more than 13 countries C) 13,000 in more than 20 countries D) 20,000 in 13 countries

Computer Science & Information Technology

________ attempts to articulate jurisdictional boundaries and procedures for multijurisdictional cases in online child pornography cases

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology