Skip to main content

3.1. Authentication Header Location

AH may be employed in two ways: transport mode or tunnel mode. (See the Security Architecture document for a description of when each should be used.)