IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private NetworksIPSec, Second Edition is the most authoritative, comprehensive, accessible, and up-to-date guide to IPSec technology. Two leading authorities cover all facets of IPSec architecture, implementation, and deployment; review important technical advances since IPSec was first standardized; and present new case studies demonstrating end-to-end IPSec security. New coverage also includes in-depth guidance on policies, updates on IPSec enhancements for large-scale enterprise environments, and much more. |
Contents
Deployment Scenarios | 11 |
TCPIP Overview སྨྲ ཙཱ མི སྐ སྐ སྒ ཧྭ ཞ ཞ 43 | 23 |
IP Security Overview | 43 |
IPSec Architecture | 59 |
The Encapsulating Security Payload ESP | 83 |
The Authentication Header AH | 93 |
The Internet Key Exchange | 101 |
Other editions - View all
Common terms and phrases
3DES AES tunnel establish aggressive mode AH and ESP AH header algorithm application authentication bits bytes CAST SHA modp-1536 certificate cipher configuration cookie cryptography data link layer decryption defines destination address Diffie-Hellman exchange digital signature domain ESP header establish CAST SHA Extranet firewall fragmentation HMAC HMAC-MD5 ICMP identify initiator interface Internet Internet Key Exchange IP address IP datagram IP header IP layer IP packet IPSec IPSec header IPSec packets IPSec processing IPSec protocols IPSec SAs IPv4 IPv6 ISAKMP key exchange key management L2TP length multicast negotiation network layer nonce options payload peer perfect forward secrecy phase two exchange PMTU port public key Quick Mode exchange requires responder router SADB security association security services selectors sequence number shown in Figure SPD entry specific subnet tion traffic transform transport layer transport mode tunnel establish CAST tunnel mode VPN gateway