A method of providing Internet Protocol (IP) security at a network layer, that
includes using two or more independent databases to process secure information,
with a first database specifying a set of rules for the IP security and a level
of security, and with a second database maintaining security information for at
least two systems.