SlideShare una empresa de Scribd logo
1 de 56
IP Security
Outline ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TCP/IP Example
Security facilities in the TCP/IP protocol stack
Need for IPSec ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IPv4 Header
IPv6 Header
IP Security Overview ,[object Object],[object Object],[object Object],[object Object],[object Object]
IP Security Overview ,[object Object],[object Object],[object Object],[object Object],[object Object]
IP Security Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IP Security Scenario
IP Security Architectures ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IPSec RFCs ,[object Object],[object Object],[object Object],[object Object],[object Object]
IPSec Document Overview
IPSec Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IPSec protocols ,[object Object],[object Object],[object Object]
Protocols vs services ESP(encryption and authentication) ESP(encryption only) AH yes yes no Limited traffic flow confidentiality yes yes no confidentiality yes yes yes Rejection of replay attacks yes yes Data origin authentication yes yes Connectionless integrity yes yes yes Access control
IPSec modes of operations ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Discussion onTunnel and Transport mode  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security services Encrypts inner IP packet. Authenticates inner IP packet. Encrypts IP payload and any IPv6 extesion header. Authenticates IP payload but no IP header ESP with authentication Encrypts inner IP packet Encrypts IP payload and any IPv6 extesion header ESP Authenticates entire inner IP packet plus selected portions of outer IP header Authenticates IP payload and selected portions of IP header and IPv6 extension headers AH Tunnel Mode SA Transport Mode SA Protocols
Security Associations (SA) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SA: Other parameters ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Policy database  (SPD) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
SPD selector entries ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication Header ,[object Object],[object Object]
Anti-replay service ,[object Object],[object Object],[object Object],[object Object],[object Object]
Authentication data ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Before applying AH
Transport Mode (AH Authentication)
Tunnel Mode (AH Authentication)
End-to-end versus End-to-Intermediate Authentication
Encapsulating Security Payload ,[object Object]
Encryption and Authentication Algorithms ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ESP Encryption and Authentication
ESP Encryption and Authentication
Combinations of Security Associations
Combinations of Security Associations
Combinations of Security Associations
Combinations of Security Associations
Key Management ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Diffie Hellman Key Exchange
Example ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Issues in  Diffie Hellman key exchange ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Oakley ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Oakley : Use of Cookies exchange ,[object Object],[object Object],[object Object],[object Object],[object Object]
Oakley : Use of Groups ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Oakley: Authentication ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISAKMP ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISAKMP
ISAKMP: payload types ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISAKMP: Exchange types ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISAKMP: Exchange types ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ISAKMP: Exchange types ,[object Object],[object Object],[object Object],[object Object],[object Object]
ISAKMP: Exchange types ,[object Object],[object Object],[object Object],[object Object],[object Object]
ISAKMP: Exchange types ,[object Object],[object Object],[object Object]
Recommended Reading ,[object Object],[object Object]

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Ipsec vpn v0.1
Ipsec vpn v0.1Ipsec vpn v0.1
Ipsec vpn v0.1
 
Ip security in i psec
Ip security in i psecIp security in i psec
Ip security in i psec
 
IPsec Basics: AH and ESP Explained
IPsec Basics: AH and ESP ExplainedIPsec Basics: AH and ESP Explained
IPsec Basics: AH and ESP Explained
 
IPSec VPN Tutorial Part1
IPSec VPN Tutorial Part1IPSec VPN Tutorial Part1
IPSec VPN Tutorial Part1
 
IPSec VPN tunnel
IPSec VPN tunnelIPSec VPN tunnel
IPSec VPN tunnel
 
IP security Part 1
IP security   Part 1IP security   Part 1
IP security Part 1
 
IPsec
IPsecIPsec
IPsec
 
Ipsec (network security)
Ipsec (network security)Ipsec (network security)
Ipsec (network security)
 
Ipsec 2
Ipsec 2Ipsec 2
Ipsec 2
 
ip security
ip securityip security
ip security
 
IPSec VPN & IPSec Protocols
IPSec VPN & IPSec ProtocolsIPSec VPN & IPSec Protocols
IPSec VPN & IPSec Protocols
 
IP security
IP securityIP security
IP security
 
IP Security in Network Security NS6
IP Security in Network Security NS6IP Security in Network Security NS6
IP Security in Network Security NS6
 
Mobile Security - Wireless hacking
Mobile Security - Wireless hackingMobile Security - Wireless hacking
Mobile Security - Wireless hacking
 
Overview of ip_security by JetArvind kumar Madhukar
Overview of ip_security by JetArvind kumar Madhukar Overview of ip_security by JetArvind kumar Madhukar
Overview of ip_security by JetArvind kumar Madhukar
 
Unit 5
Unit 5Unit 5
Unit 5
 
Ip security
Ip security Ip security
Ip security
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Authentication in wireless - Security in Wireless Protocols
Authentication in wireless - Security in Wireless ProtocolsAuthentication in wireless - Security in Wireless Protocols
Authentication in wireless - Security in Wireless Protocols
 
Pgp pretty good privacy
Pgp pretty good privacyPgp pretty good privacy
Pgp pretty good privacy
 

Destacado

Evolution of Newspapers EDUC 515
Evolution of Newspapers EDUC 515Evolution of Newspapers EDUC 515
Evolution of Newspapers EDUC 515laurenkeane
 
SKF First-quarter 2011 report
SKF First-quarter 2011 reportSKF First-quarter 2011 report
SKF First-quarter 2011 reportSKF
 
Evolution of online interactions while observing classroom situations on vide...
Evolution of online interactions while observing classroom situations on vide...Evolution of online interactions while observing classroom situations on vide...
Evolution of online interactions while observing classroom situations on vide...Université de Sherbrooke
 
comercio electronico
comercio electronicocomercio electronico
comercio electronicodiana
 
Adoption of environmental technologies
Adoption of environmental technologiesAdoption of environmental technologies
Adoption of environmental technologiesTurlough Guerin
 
Earth, an inhabited planet. Extra activities
Earth, an inhabited planet. Extra activitiesEarth, an inhabited planet. Extra activities
Earth, an inhabited planet. Extra activitiesfcavilla
 
Syllabus presentation
Syllabus presentationSyllabus presentation
Syllabus presentationskearney
 
Noun;there is...there are -at airport and on airplane
Noun;there is...there are -at airport and on airplaneNoun;there is...there are -at airport and on airplane
Noun;there is...there are -at airport and on airplaneAldyansyah -
 
Communicating The Message Telstra & The Environmentpdf
Communicating The Message  Telstra & The EnvironmentpdfCommunicating The Message  Telstra & The Environmentpdf
Communicating The Message Telstra & The EnvironmentpdfTurlough Guerin
 
Clothes
ClothesClothes
Clothessarita
 

Destacado (20)

Evolution of Newspapers EDUC 515
Evolution of Newspapers EDUC 515Evolution of Newspapers EDUC 515
Evolution of Newspapers EDUC 515
 
SKF First-quarter 2011 report
SKF First-quarter 2011 reportSKF First-quarter 2011 report
SKF First-quarter 2011 report
 
Evolution of online interactions while observing classroom situations on vide...
Evolution of online interactions while observing classroom situations on vide...Evolution of online interactions while observing classroom situations on vide...
Evolution of online interactions while observing classroom situations on vide...
 
13 lenses
13 lenses13 lenses
13 lenses
 
comercio electronico
comercio electronicocomercio electronico
comercio electronico
 
Celeb shakespeare 1
Celeb shakespeare 1Celeb shakespeare 1
Celeb shakespeare 1
 
Taguchis 3 Ps
Taguchis 3 PsTaguchis 3 Ps
Taguchis 3 Ps
 
Adoption of environmental technologies
Adoption of environmental technologiesAdoption of environmental technologies
Adoption of environmental technologies
 
Earth, an inhabited planet. Extra activities
Earth, an inhabited planet. Extra activitiesEarth, an inhabited planet. Extra activities
Earth, an inhabited planet. Extra activities
 
Surrealism
Surrealism Surrealism
Surrealism
 
Connactive
ConnactiveConnactive
Connactive
 
Two-Column Proofs
Two-Column ProofsTwo-Column Proofs
Two-Column Proofs
 
Syllabus presentation
Syllabus presentationSyllabus presentation
Syllabus presentation
 
You Scream I Scream Gazpacho
You Scream I Scream GazpachoYou Scream I Scream Gazpacho
You Scream I Scream Gazpacho
 
Noun;there is...there are -at airport and on airplane
Noun;there is...there are -at airport and on airplaneNoun;there is...there are -at airport and on airplane
Noun;there is...there are -at airport and on airplane
 
El Transcantabrico Gran Lujo 2011
El Transcantabrico Gran Lujo 2011El Transcantabrico Gran Lujo 2011
El Transcantabrico Gran Lujo 2011
 
Communicating The Message Telstra & The Environmentpdf
Communicating The Message  Telstra & The EnvironmentpdfCommunicating The Message  Telstra & The Environmentpdf
Communicating The Message Telstra & The Environmentpdf
 
Siagian problematika bipa_uni_aust
Siagian problematika bipa_uni_austSiagian problematika bipa_uni_aust
Siagian problematika bipa_uni_aust
 
Clothes
ClothesClothes
Clothes
 
If it ain’t got that swingupdate2
If it ain’t got that swingupdate2If it ain’t got that swingupdate2
If it ain’t got that swingupdate2
 

Similar a IPSec Overview Authentication Header ESP Key Management ISAKMP Secure VPNs

Similar a IPSec Overview Authentication Header ESP Key Management ISAKMP Secure VPNs (20)

Ip Sec Rev1
Ip Sec Rev1Ip Sec Rev1
Ip Sec Rev1
 
8.X Sec & I Pv6
8.X Sec & I Pv68.X Sec & I Pv6
8.X Sec & I Pv6
 
WLAN and IP security
WLAN and IP securityWLAN and IP security
WLAN and IP security
 
IS - SSL
IS - SSLIS - SSL
IS - SSL
 
Network IP Security.pdf
Network IP Security.pdfNetwork IP Security.pdf
Network IP Security.pdf
 
Web Security
Web SecurityWeb Security
Web Security
 
IP Security
IP SecurityIP Security
IP Security
 
Websecurity
Websecurity Websecurity
Websecurity
 
Lecture14..pdf
Lecture14..pdfLecture14..pdf
Lecture14..pdf
 
Ch16
Ch16Ch16
Ch16
 
Computer network (4)
Computer network (4)Computer network (4)
Computer network (4)
 
Ipsecurity
IpsecurityIpsecurity
Ipsecurity
 
Moein
MoeinMoein
Moein
 
Ip security
Ip security Ip security
Ip security
 
1643129870-internet-security.pptx
1643129870-internet-security.pptx1643129870-internet-security.pptx
1643129870-internet-security.pptx
 
IP SEC.ptx
IP SEC.ptxIP SEC.ptx
IP SEC.ptx
 
IPsec with AH
IPsec with AHIPsec with AH
IPsec with AH
 
I psec
I psecI psec
I psec
 
Chapter 6.ppt
Chapter 6.pptChapter 6.ppt
Chapter 6.ppt
 
Chapter 6 (1).ppt
Chapter 6 (1).pptChapter 6 (1).ppt
Chapter 6 (1).ppt
 

Más de Ram Dutt Shukla (20)

Message Authentication
Message AuthenticationMessage Authentication
Message Authentication
 
Shttp
ShttpShttp
Shttp
 
Web Security
Web SecurityWeb Security
Web Security
 
I Pv6 Addressing
I Pv6 AddressingI Pv6 Addressing
I Pv6 Addressing
 
Anycast & Multicast
Anycast & MulticastAnycast & Multicast
Anycast & Multicast
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
Congestion Control
Congestion ControlCongestion Control
Congestion Control
 
Retransmission Tcp
Retransmission TcpRetransmission Tcp
Retransmission Tcp
 
Tcp Congestion Avoidance
Tcp Congestion AvoidanceTcp Congestion Avoidance
Tcp Congestion Avoidance
 
Tcp Immediate Data Transfer
Tcp Immediate Data TransferTcp Immediate Data Transfer
Tcp Immediate Data Transfer
 
Tcp Reliability Flow Control
Tcp Reliability Flow ControlTcp Reliability Flow Control
Tcp Reliability Flow Control
 
Tcp Udp Notes
Tcp Udp NotesTcp Udp Notes
Tcp Udp Notes
 
Transport Layer [Autosaved]
Transport Layer [Autosaved]Transport Layer [Autosaved]
Transport Layer [Autosaved]
 
Transport Layer
Transport LayerTransport Layer
Transport Layer
 
T Tcp
T TcpT Tcp
T Tcp
 
Anycast & Multicast
Anycast & MulticastAnycast & Multicast
Anycast & Multicast
 
Igmp
IgmpIgmp
Igmp
 
Mobile I Pv6
Mobile I Pv6Mobile I Pv6
Mobile I Pv6
 
Mld
MldMld
Mld
 
Mobility And Mobile I Pv4
Mobility And Mobile I Pv4Mobility And Mobile I Pv4
Mobility And Mobile I Pv4
 

Último

ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxnelietumpap1
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 

Último (20)

ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Q4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptxQ4 English4 Week3 PPT Melcnmg-based.pptx
Q4 English4 Week3 PPT Melcnmg-based.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 

IPSec Overview Authentication Header ESP Key Management ISAKMP Secure VPNs