Skip to main content
IBM 
ShopSupportDownloads
IBM HomeProductsConsultingIndustriesNewsAbout IBM
IBM : developerWorks : Security : Education - online courses
Virtual private networks, Part 1
Download tutorial zip fileView letter-sized PDF fileView A4-sized PDF fileE-mail this tutorial to a friend
Main menuSection menuGive feedback on this tutorialPreviousNext
5. IPSec: AH protocol structure
  


The AH itself page 3 of 9


The AH itself looks like this:



+---------------+---------------+---------------+---------------+
| Next Header   |    Length     |            RESERVED           |
+---------------+---------------+---------------+---------------+
|                    Security Parameters Index                  |
+---------------+---------------+---------------+---------------+
|     Authentication Data (variable number of 32-bit words)     |
+---------------+---------------+---------------+---------------+
|1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8|

Main menuSection menuGive feedback on this tutorialPreviousNext
PrivacyLegalContact