IPSec Crypto - Profile Protocol - Interpreting BPA Checks
In this video, learn more about IPSec Crypto Profile Protocol checks, why they're important, and why ESP provides better security than AH.
Select a protocol for securing data that traverses the VPN tunnel: Encapsulating Security Payload or Authentication Header. ESP encrypts data, authenticates the source, and verifies data integrity. AH authenticates the source and verifies data integrity. The IPSec Crypto Profile Protocol best practice check ensures that the ESP protocol is being used in an IPSec Crypto profile.
Comments
Post a Comment