Check out the new USENIX Web site. next up previous
Next: Bridge Up: Introduction Previous: Introduction

Paper Organization

Section 2 briefly describes the bridge itself and the filtering of frames containing IP traffic. Section 3 describes the use of IPsec in conjunction with the bridge to build virtual LANs and transparent IPsec gateways. Section 4 discusses open ends and future work, and Section 5 concludes the paper.



Angelos D. Keromytis
4/21/2000