Problem
I. Give examples of applications of IPsec.
II. What services are provided by IPsec?
III. What parameters identify an SA and what parameters characterize the nature of a particular SA?
IV. What is the difference between transport mode and tunnel mode?
V. What is a replay attack?
VI. Why does ESP include a padding field?
VII. What are the basic approaches to bundling SAs?
VIII. What are the roles of the Oakley key determination protocol and ISAKMP in IPsec?
The response should include a reference list. Using one-inch margins, Times New Roman 12 pnt font, double-space and APA style of writing and citations.