[e2e] where to put endpoint authentication?
RJ Atkinson
rja at extremenetworks.com
Mon May 10 13:27:00 PDT 2004
On May 10, 2004, at 14:09, Joe Touch wrote:
> HIP (IMO) appears similar to IPsec in the protection it provides (i.e.,
> network layer), and is very similar to IPsec tunnel mode in how
> endpoint
> ID is somewhat decoupled from forwarding ID (like E2E tunnels, the
> endpoint needs to 'route' based on these endpoint IDs, though).
"similar" was a good choice of wording above. My perception is that
the set of protections provided with HIP is not identical with those
provided by ESP/AH. Maybe I am just confused about how HIP works.
Ran
More information about the end2end-interest
mailing list