Research Article

Cryptographic Algorithm Invocation Based on Software-Defined Everything in IPsec

Figure 5

Modification to (a) the configuration file for adding a new algorithm and (b) the established IPsec connection.
(a)
(b)