Yes you can -- its something like digital signature...Its not so much secure (for data confidentiality) - every one can decrypt message with public key
BUT it says yes this message was encrypted with private key of host A so sender is host A - so such scenario is used for proof of identity...
Second scenario with asymmmetric cryptography: message is encrypted with public key of host A and can be decrypted only with private key of host A so only host A can decrypt message - its used when confidentiality is needed
Table of ContentsIntroductionVersion HistoryPossible Future
UpdatesDocuments PurposeNAT Operation in ASA 8.3+ SectionsRule Types
Network Object NATTwice NAT / Manual NATRule Types used per SectionNAT
Types used with Twice NAT / Manual NAT and Network Obje...
Table of Contents Introduction:This document describes details on how
NAT-T works. Background: ESP encrypts all critical information,
encapsulating the entire inner TCP/UDP datagram within an ESP header.
ESP is an IP protocol in the same sense that TCP an...