gptkbp:instance_of
|
gptkb:protocol
|
gptkbp:can_be_combined_with
|
ESP
|
gptkbp:can_be_configured_for
|
security policies
specific applications
security associations
|
gptkbp:dependency
|
key management protocols
|
gptkbp:developed_by
|
gptkb:Internet_Engineering_Task_Force
|
gptkbp:does_not_provide
|
encryption
|
https://www.w3.org/2000/01/rdf-schema#label
|
IPsec Authentication Header (AH)
|
gptkbp:is_compatible_with
|
gptkb:IKE
IPsec protocols
|
gptkbp:is_defined_by
|
gptkb:RFC_2402
gptkb:RFC_4302
|
gptkbp:is_implemented_in
|
firewalls
VPN gateways
|
gptkbp:is_part_of
|
gptkb:IPsec
gptkb:IPsec_suite
data protection strategies
IPsec framework
network security protocols
secure network architecture
|
gptkbp:is_protected_by
|
replay attacks
|
gptkbp:is_related_to
|
data security
ESP
transport layer security
|
gptkbp:is_standardized_by
|
gptkb:IETF
|
gptkbp:is_supported_by
|
network devices
most routers
|
gptkbp:is_used_for
|
secure communications
secure data transmission
|
gptkbp:is_used_in
|
VPNs
corporate networks
secure remote access
site-to-site VPNs
remote access VPNs
|
gptkbp:is_used_to
|
authenticate IP packets
|
gptkbp:is_utilized_by
|
enterprise networks
|
gptkbp:is_utilized_in
|
secure communications over the internet
|
gptkbp:is_vulnerable_to
|
man-in-the-middle attacks
|
gptkbp:operates_under
|
network layer
|
gptkbp:provides
|
data integrity
data origin authentication
|
gptkbp:requires
|
authentication algorithms
|
gptkbp:suitable_for
|
data confidentiality
|
gptkbp:supports
|
gptkb:IPv4
gptkb:IPv6
|
gptkbp:uses
|
HMAC
|
gptkbp:bfsParent
|
gptkb:IPsec_Encapsulating_Security_Payload_(ESP)
|
gptkbp:bfsLayer
|
6
|