Composition of IPsec ( Internet Protocol Security )

Composition of IPsec ( Internet Protocol Security )

IPsec combines three main protocols to form a cohesive security framework:

? Internet Key Exchange (IKE) protocol

? Encapsulating Security Payload (ESP) protocol

? Authentication Header (AH) protocol

Of these three protocols, IKE and ESP are the ones that are mostly deployed together. Although AH is also an important component of the IPsec protocol suite, not that many deployments of IPsec have this protocol turned on for use. In general, much of AH's functionality is embedded in ESP. Therefore, in our discussions in the rest of the coming articles, we will focus our attention on ESP, and much of the discussion will assume that we are talking about ESP unless otherwise stated. For example, while discussing quick-mode exchanges in the following articles, we will assume that the goal is to do ESP. IKE is used to negotiate the parameters between two IPsec peers for setting up a tunnel between them. We will look in detail at the workings of IKE in the next section. ESP provides the encapsulation mechanism for IPsec traffic. We will go into a more detailed discussion of ESP later on as well. Table 13-1 describes the three main components of the IPsec protocol suite. Table 13-1. IPsec Combines Three Main Protocols to Form a Cohesive Security Framework Protocol Description IKE Provides a framework for negotiating security parameters and establishing authenticated keys. ESP Provides a framework for encrypting, authenticating, and securing data. AH Provides a framework for authenticating and securing data

要查看或添加评论,请登录

Shashank Sharma的更多文章

  • LOOK FOR THE BEST IN OTHERS IT BRINGS OUT THE BEST IN YOU

    LOOK FOR THE BEST IN OTHERS IT BRINGS OUT THE BEST IN YOU

    Work is work only if we prefer to be somewhere else. Work tends to be a negative perception of a task which we…

  • Classification Algorithm in Machine Learning

    Classification Algorithm in Machine Learning

    Classification is defined as the process of recognition, understanding, and grouping of objects and ideas into preset…

  • Braille Day and Shark Tank's Annie

    Braille Day and Shark Tank's Annie

    Two days ago was Braille Day, a day pioneer in history for those suffering from visual impairment. 4th January is the…

  • Introduction to IKE

    Introduction to IKE

    `IKE or Internet key exchange is the protocol responsible for negotiating the IPsec tunnel characteristics between two…

  • Types of CLustering Algorithm

    Types of CLustering Algorithm

    Types of Clustering Algo K-means clustering is the most commonly used clustering algorithm. It's a centroid-based…

  • Types of Clustering Methods

    Types of Clustering Methods

    Types of Clustering Methods The clustering methods are broadly divided into Hard clustering (data point belonging to…

  • Clustering

    Clustering

    Clustering is the task of dividing the population or data points into a number of groups such that data points in the…

    2 条评论

社区洞察

其他会员也浏览了