mip6-8----Page:4
1  2  3  4  5  6  7  8  9 

How to implement the mobile firewall
Security Tables (I)
Focuses on how to effectively manage the security stuff, such as security keys, security associations, security rules, etc. in order to minimize the overhead on mobile devices and provide strong security.

Trust MAP cache (in Home Agent HA)



Security association cache (in HA)




Security association cache (in MAP)


PPT Version