... Page 2 Monday, October 30, 2000 2:23 PM IPSec Virtual Private Networks A Technical Guide to Getting Started 3 faster today than yesterday, matched with massive amounts of money to create ... protocols, are fairlystraightforward and the implementation options, with regard to automatic key man-agement, are what need to be conveyed carefully. The part that always seems to getattention ... communicationsare vulnerable to, message authentication addresses a portion of the vulnerabilities.Message authentication is used as a tool to combine various communication-specificdata that can...