<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Out of the box, yes.By in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/why-would-anyone-use-authentication-header-in-a-transform-set/m-p/2527140#M1886</link>
    <description>&lt;P&gt;That pretty much sums it up.&lt;/P&gt;&lt;P&gt;It's been argued in a few places on the Internet that there's no reason to even have AH anymore, though I've heard some contend that it has a better authentication mechanism than ESP. Personally, I haven't seen anything supporting this argument.&lt;/P&gt;</description>
    <pubDate>Fri, 18 Jul 2014 22:36:57 GMT</pubDate>
    <dc:creator>ghostinthenet</dc:creator>
    <dc:date>2014-07-18T22:36:57Z</dc:date>
    <item>
      <title>Why would anyone use Authentication Header in a transform set ?</title>
      <link>https://community.cisco.com/t5/network-access-control/why-would-anyone-use-authentication-header-in-a-transform-set/m-p/2527135#M1881</link>
      <description>&lt;P&gt;I came across a configuration that uses an IPSEC transform-set of ah-sha-hmac esp-3des.&amp;nbsp; This is a Cisco router, and it is running inside an MPLS tunnel.&amp;nbsp; Since ESP does all of what AH does, are there any good reasons to use AH?&lt;/P&gt;</description>
      <pubDate>Fri, 21 Feb 2020 18:29:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/why-would-anyone-use-authentication-header-in-a-transform-set/m-p/2527135#M1881</guid>
      <dc:creator>jimmyc_2</dc:creator>
      <dc:date>2020-02-21T18:29:21Z</dc:date>
    </item>
    <item>
      <title>It depends on whether you</title>
      <link>https://community.cisco.com/t5/network-access-control/why-would-anyone-use-authentication-header-in-a-transform-set/m-p/2527136#M1882</link>
      <description>&lt;P&gt;Let me edit this because I didn't fully read the context.&lt;/P&gt;&lt;P&gt;It's a bit odd to see, but not out of the question. ESP has largely supplanted AH because authentication/integrity and encryption can be handled in one protocol. AH is still valid in this scenario, but most just do everything with ESP now.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jul 2014 22:02:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/why-would-anyone-use-authentication-header-in-a-transform-set/m-p/2527136#M1882</guid>
      <dc:creator>ghostinthenet</dc:creator>
      <dc:date>2014-07-18T22:02:32Z</dc:date>
    </item>
    <item>
      <title>Interesting.   But if you</title>
      <link>https://community.cisco.com/t5/network-access-control/why-would-anyone-use-authentication-header-in-a-transform-set/m-p/2527137#M1883</link>
      <description>&lt;P&gt;Interesting.&amp;nbsp;&amp;nbsp; But if you trust the MPLS tunnel for the encryption and total security, why bother with a second IPSec tunnel with AH?&amp;nbsp; Why not just route the data nominally, and let MPLS do all the security.&amp;nbsp; I don't see what you gain by doing AH ?&amp;nbsp;&amp;nbsp; Maybe you don't trust some devices on the "inside"???&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jul 2014 22:06:49 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/why-would-anyone-use-authentication-header-in-a-transform-set/m-p/2527137#M1883</guid>
      <dc:creator>jimmyc_2</dc:creator>
      <dc:date>2014-07-18T22:06:49Z</dc:date>
    </item>
    <item>
      <title>Most cases I've seen for</title>
      <link>https://community.cisco.com/t5/network-access-control/why-would-anyone-use-authentication-header-in-a-transform-set/m-p/2527138#M1884</link>
      <description>&lt;P&gt;Most cases I've seen for IPSec on MPLS are due to being prudent about trusting the service provider. Others want to deploy technologies like DMVPN over MPLS to maintain discreet internal routing between sites without having to get the service provider involved for changes in how traffic flows.&lt;/P&gt;&lt;P&gt;In the first case, it's usually GET VPN that is used to provide a blanket encryption policy over the entire MPLS VRF. In the second, encryption sometimes isn't used at all.&lt;/P&gt;&lt;P&gt;When it comes to running this sort of thing, the decision isn't usually made due to technical factors. It's more about policy.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jul 2014 22:13:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/why-would-anyone-use-authentication-header-in-a-transform-set/m-p/2527138#M1884</guid>
      <dc:creator>ghostinthenet</dc:creator>
      <dc:date>2014-07-18T22:13:34Z</dc:date>
    </item>
    <item>
      <title>Okay, final thought. There is</title>
      <link>https://community.cisco.com/t5/network-access-control/why-would-anyone-use-authentication-header-in-a-transform-set/m-p/2527139#M1885</link>
      <description>&lt;P&gt;Okay, final thought.&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is NO advantage to using AH, except that it uses fewer CPU cycles, and ONLY IF you don't want to encrypt the data.&amp;nbsp;&lt;/P&gt;&lt;P&gt;True statement?&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jul 2014 22:22:06 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/why-would-anyone-use-authentication-header-in-a-transform-set/m-p/2527139#M1885</guid>
      <dc:creator>jimmyc_2</dc:creator>
      <dc:date>2014-07-18T22:22:06Z</dc:date>
    </item>
    <item>
      <title>Out of the box, yes.By</title>
      <link>https://community.cisco.com/t5/network-access-control/why-would-anyone-use-authentication-header-in-a-transform-set/m-p/2527140#M1886</link>
      <description>&lt;P&gt;That pretty much sums it up.&lt;/P&gt;&lt;P&gt;It's been argued in a few places on the Internet that there's no reason to even have AH anymore, though I've heard some contend that it has a better authentication mechanism than ESP. Personally, I haven't seen anything supporting this argument.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jul 2014 22:36:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/why-would-anyone-use-authentication-header-in-a-transform-set/m-p/2527140#M1886</guid>
      <dc:creator>ghostinthenet</dc:creator>
      <dc:date>2014-07-18T22:36:57Z</dc:date>
    </item>
  </channel>
</rss>

