Chapter 1

IPSec: Concept for secure IP connections

1 IPSec: Concept for secure IP connections

Policies The introduction of network security mainly involves the application of traffic policies. Firstly, the policies need to be defined, then it should be whether the policies are correctly applied.

Security policies can apply to various levels. The IPSec protocol (Internet Protocol Security) applies to the IP layer. This location of the IPSec protocol within the layered network model makes it a generic solution for a wide range of applications.

Types of policies supported in the IPSec protocol:

user/entity authentication

level of encryption

validity time of the keys

...

The Target of IPSec The main goals for using the IPSec protocol suite are:

Integrity of data

It ensures that data has not been modified in transit.

Confidentiality of data

On non-trusted network sections, the data is encrypted. When this data is intercepted, it cannot be interpreted by the eavesdropper.

User authentication

Ensures that you know the party you are communicating with, and that they are who they say they are.

In this section The following items are discussed in this section:

Topic

Page

 

 

1.1 IPSec Concepts

12

 

 

E-DOC-CTC-20051017-0169 v1.0

11

 

Page 13
Image 13
Nortel Networks 608(WL), 620 manual IPSec Concept for secure IP connections, Topic