1. Explain how the different IPsec modes apply encryption either above or below the IP layer.
2. Describe the IKE protocol in terms of the keying techniques introduced in Section 14.2.
3. Describe WEP2 key negotiation in terms of the keying techniques introduced in Section 14.2.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here