1 Why does ESP include a padding field?
2 What are the basic approaches to bundling SAs?
3 What are the roles of the Oakley key determination protocol and ISAKMP in IPsec
1 Give examples of applications of IPsec.
2 What services are provided by IPsec?
3 What parameters identify an SA and what parameters characterize the nature of a particular SA?
4 What is the difference between transport mode and tunnel mode?
5 What is a replay attack?