The AH protocol (IP protocol 51) forms the other part of IPsec. The AH does not encrypt data in the usual sense, by hiding the data, but it adds a tamper-evident seal to the data. It also protects the non-mutable fields in the IP header carrying the data, which includes the address fields of the IP header. The AH protocol should not be used alone when there is a requirement for data confidentiality.
http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/WAN_and_MAN/IPSec_Over.html#wp999915
The AH protocol (IP protocol 51) forms the other part of IPsec. The AH does not encrypt data in the usual sense, by hiding the data, but it adds a tamper-evident seal to the data. It also protects the non-mutable fields in the IP header carrying the data, which includes the address fields of the IP header. The AH protocol should not be used alone when there is a requirement for data confidentiality.
I know this is juniper exam(*ゝω・*)ノ
0
0