Statements (52)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:protocol
|
gptkbp:can_be_combined_with |
gptkb:SSL/_TLS
|
gptkbp:can_be_configured_for |
security policies
IPsec protocols |
gptkbp:can_be_used_to |
digital certificates
pre-shared keys |
gptkbp:can_be_used_with |
gptkb:IPv4
gptkb:IPv6 |
gptkbp:can_provide |
anti-replay protection
traffic flow confidentiality |
gptkbp:designed_for |
secure Internet Protocol communications
|
https://www.w3.org/2000/01/rdf-schema#label |
IPsec suite
|
gptkbp:includes |
gptkb:AH_(Authentication_Header)
gptkb:ESP_(Encapsulating_Security_Payload) |
gptkbp:is_compatible_with |
NAT (Network Address Translation)
|
gptkbp:is_enhanced_by |
strong encryption standards
robust authentication mechanisms |
gptkbp:is_evaluated_by |
gptkb:performance
interoperability scalability |
gptkbp:is_implemented_in |
VPNs
firewalls |
gptkbp:is_often_used_in |
corporate networks
government networks |
gptkbp:is_part_of |
VPN technology
secure communication protocols IP security architecture |
gptkbp:is_related_to |
authentication methods
encryption algorithms |
gptkbp:is_standardized_by |
gptkb:IETF
|
gptkbp:is_subject_to |
regulatory compliance
security vulnerabilities attacks |
gptkbp:is_supported_by |
network devices
most modern operating systems |
gptkbp:is_used_for |
secure data transmission
secure remote access secure site-to-site connections |
gptkbp:is_used_in |
cloud security
Vo IP security data center security |
gptkbp:operates_under |
network layer
|
gptkbp:provides |
data integrity
data confidentiality data origin authentication |
gptkbp:supports |
site-to-site VPNs
remote access VPNs |
gptkbp:uses |
encryption
authentication |
gptkbp:was_first_defined_in |
gptkb:RFC_2401
|
gptkbp:bfsParent |
gptkb:RFC_4303
|
gptkbp:bfsLayer |
5
|