answersLogoWhite

0


Best Answer

SPI field

User Avatar

Wiki User

11y ago
This answer is:
User Avatar

Add your answer:

Earn +20 pts
Q: In IPv6 which field is used in conjunction with the authentication header and the destination address to identify the security association to be implemented for the AH?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

Which authentication proof is implemented with Biometrics?

Authentication proofs are often grouped into the categories: Something you know (like a password or PIN) Something you have (like a smart card or dongle) Something you are - this would be biometrics.


What is an association list?

An association list is a data structure which associates keys with data, implemented as a list whose members are paired storage locations.


What is the state?

According to a popular, accepted Weberian definition, the state is an association with holds a monopoly of coercion in a given geographic region. A state, then consists of three key elements: 1. An association which holds the means to power. 2. A series of institutions by which the association enforces and implements that power. 3. A region in which the association enforces the power (and, by implication, people it is implemented upon).


How can I say java based applications are secure?

All Java Based Apps are secure because Java is one of the most secure programming languages. For Ex: In Web applications, security can be implemented using strong authentication. The different types of Authentication used in Web Applications are:• HTTP Basic Authentication - Authentication based on a username and password. It is the authentication mechanism defined in the HTTP/1.0 specification. A Web server requests a Web client to authenticate the user. The Web client obtains the username and the password from the user and transmits them to the Web server. The Web server then authenticates the user. This is the lowest level security of the four here.• HTTP Digest Authentication - The password is encrypted. Like HTTP Basic Authentication, HTTP Digest Authentication authenticates a user based on a username and a password. However, the authentication is performed by transmitting the password in an encrypted form.• HTTPS Client Authentication - This is end user authentication using HTTPS (HTTP over SSL). This mechanism uses public key encryption, which requires the user to possess a Public Key Certificate (PKC). This is the highest level security of the four here.• Form Based Authentication - This is similar to Basic except that a form is used with predefined fields. These fields must be named j_username and j_password, respectively and the form method and action must be named POST and j_security_check, respectively


What protocol used by gmail?

IMAP and SMTP use the standard Simple Authentication and Security Layer (SASL), via the native IMAP AUTHENTICATE and SMTP AUTHcommands, to authenticate users. The SASL XOAUTH2 mechanism enables clients to provide OAuth 2.0 credentials for authentication. The SASL XOAUTH2 protocol documentation describes the SASL XOAUTH2 mechanism in great detail, and libraries and samples which have implemented the protocol are available.


What is functionality of eir in gsm?

The EIR is a database that contains information about the identity of mobile equipment that prevents calls from stolen, unauthorized, or defective mobile stations. The AUC (authentication centre) and EIR are implemented as stand-alone nodes or as a combined AUC/EIR node.


Which isc document provides guidelines for measuring the effectiveness of implemented security measures?

The International Systems Security Engineering Association (ISSEA) recommends the creation of a Security Effectiveness Metric for the measurement of security measures. This metric seeks to assess the degree to which security measures are effectively implemented and operational within an organization.


Which is more stable raid implemented by windows or raid implemented by hardware?

Raid implemented by Hardware is more stable than RAID implemented by Windows


When were labeling standards implemented for brooms and brushes?

In the 2000s, the American Brush Manufacturers Association (ABMA) was involved in creating labeling standards so consumers could better compare product quality.


What is an anchor tag?

An anchor tag is a HTML element that creates a link to a target URL. When correctly implemented, the link can wrap around text, images, or as buttons, so that users can interact with it and visit the link's destination.


When will the Sixth Pay Commission be implemented?

it will be implemented from september.


Where did the 1800 kcal ADA diet come from?

his diet was implemented by the American Diabetic Association to help over weight diabetics loose weight. The average persons diet should consist of 2400 calories daily.