1 | 5 | ||||||||||||||||||||
2 | |||||||||||||||||||||
3 | |||||||||||||||||||||
4 | |||||||||||||||||||||
1. A set of rules that control network traffic by allowing or denying packets based on specified criteria such as source or destination IP address, port number, or protocol.
2. A protocol used in IPsec to provide data integrity, authentication, and anti-replay services.
3. An IPsec configuration where only the payload of the IP packet is encrypted and authenticated, while the original IP header remains intact.
4. A protocol used to establish security associations in IPsec, allowing the negotiation of keys and algorithms for secure communication.
5. A set of security parameters negotiated between two IPsec peers for secure communication, including encryption algorithm, integrity algorithm, and keys.