{"draft":"draft-ietf-ipsec-esp-v3-10","doc_id":"RFC4303","title":"IP Encapsulating Security Payload (ESP)","authors":["S. Kent"],"format":["ASCII","HTML"],"page_count":"44","pub_status":"PROPOSED STANDARD","status":"PROPOSED STANDARD","source":"IP Security Protocol","abstract":"This document describes an updated version of the Encapsulating Security\r\nPayload (ESP) protocol, which is designed to provide a mix of security\r\nservices in IPv4 and IPv6. ESP is used to provide confidentiality,\r\ndata origin authentication, connectionless integrity, an anti-replay\r\nservice (a form of partial sequence integrity), and limited traffic\r\nflow confidentiality. This document obsoletes RFC 2406 (November\r\n1998). [STANDARDS-TRACK]","pub_date":"November 2005","keywords":["ESP","ipsec","internet","protocol","encapsulating","security","ipv4","ipv6","ip security","confidentiality","authentication","integrity","anti-replay","ah","ip authentication header","ike","internet key exchange","ikev2","esn","extended sequence number"],"obsoletes":["RFC2406"],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC4303","errata_url":"https:\/\/www.rfc-editor.org\/errata\/rfc4303"}