as an experiment, you send a simple ip frame composed of ip header and tcp segment, ipaddr1-tcpsegment, through an ipsec encrypted channel. ipaddr1 is the original ip address on that packet. on the other side of the channel, using a tool like wireshark to capture and analyze packets, you capture the frame ipaddr2-ipsechdr-encryped data. here, ipaddr2 is the ip header of the captured segment that shows a different, readable ip address. ipsechdr is the correct and expected readable ipsec header. the rest of the packet is encrypted. what conclusion can you draw from this experiment?