Statements (63)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:IPsec
|
gptkbp:can_be_combined_with |
ESP
|
gptkbp:can_be_configured_for |
policy-based management
specific applications security associations |
gptkbp:dependency |
key management
|
gptkbp:does_not_provide |
encryption
|
https://www.w3.org/2000/01/rdf-schema#label |
IPsec AH
|
gptkbp:is_compatible_with |
gptkb:IKE
|
gptkbp:is_defined_by |
gptkb:RFC_4302
|
gptkbp:is_documented_in |
technical specifications
|
gptkbp:is_evaluated_by |
security policies
network administrators |
gptkbp:is_implemented_in |
routers
firewalls |
gptkbp:is_part_of |
gptkb:IPsec_suite
network security protocols secure communication protocols secure network architecture IPsec architecture |
gptkbp:is_protected_by |
man-in-the-middle attacks
replay attacks |
gptkbp:is_related_to |
gptkb:IPsec_ESP
data integrity data authentication transport mode tunnel mode |
gptkbp:is_standardized_by |
gptkb:IETF
|
gptkbp:is_subject_to |
gptkb:RFC_4301
|
gptkbp:is_supported_by |
most operating systems
|
gptkbp:is_tested_for |
security standards
|
gptkbp:is_used_for |
secure communication
|
gptkbp:is_used_in |
gptkb:cloud_services
VPNs mobile networks enterprise networks secure data transmission site-to-site VPNs remote access VPNs Io T security Vo IP security |
gptkbp:is_utilized_by |
gptkb:educational_institutions
gptkb:financial_institutions IT professionals enterprise applications government agencies data centers telecommunications companies healthcare organizations service providers network engineers remote workers |
gptkbp:is_vulnerable_to |
certain attacks
|
gptkbp:operates |
network layer
|
gptkbp:provides |
authentication
integrity |
gptkbp:requires |
shared secret or certificates
|
gptkbp:supports |
gptkb:IPv4
gptkb:IPv6 |
gptkbp:uses |
HMAC
|
gptkbp:bfsParent |
gptkb:IPsec_Encapsulating_Security_Payload_(ESP)
gptkb:IKE_(Internet_Key_Exchange) |
gptkbp:bfsLayer |
6
|