Internet Draft Security Architecture for IP December 2004
نویسنده
چکیده
This document describes an updated version of the "Security Architecture for IP", which is designed to provide security services for traffic at the IP layer. This document obsoletes RFC 2401 (November 1998). Comments should be sent to Stephen Kent ([email protected]). [RFC Editor: Please remove this line prior to publication as an RFC.]
منابع مشابه
Internet Draft Security Architecture for IP 4
This memo describes the security mechanisms for IP version 4 (IPv4) and IP version 6 (IPv6) and the services that they provide. Each security mechanism is specified in a separate document. This document also describes key management requirements for systems implementing those security mechanisms. This document is not an overall Security Architecture for the Internet and is instead focused on IP...
متن کاملInternet Draft Security Architecture for IP 10 November 1996
This memo describes the security protocols for IP version 4 (IPv4) and IP version 6 (IPv6) and the services that they provide. Each security protocol is specified in a separate document. This document also describes key management requirements for systems implementing these security protocols. This document is not an overall Security Architecture for the Internet; it addresses only IP-layer sec...
متن کاملInternet Draft Security Architecture for IP 4 June 1996
This memo describes the security mechanisms for IP version 4 (IPv4) and IP version 6 (IPv6) and the services that they provide. Each security mechanism is specified in a separate document. This document also describes key management requirements for systems implementing those security mechanisms. This document is not an overall Security Architecture for the Internet and is instead focused on IP...
متن کاملInternet - Draft DTLS
The IP-based Internet of Things (IoT) stands for the universal interconnection of smart objects and back end users with the help of IP protocols. Secure key management among the smart objects is an important aspect of IoT security. Due to the high levels of resource constraints of the devices in terms of memory, battery capacity and CPU power, and other network characteristics such as mobility,...
متن کاملVertical Networks
This document describes an application programming interface and a corresponding protocol (MGCP) for controlling Voice over IP (VoIP) Gateways from external call control elements. The MGCP assumes a call control architecture where the call control ’intelligence’ is outside the gateways and handled by external call control elements. Arango, Dugan, Elliott, Huitema, Pickett [Page 1] draft-huitema...
متن کامل