IPSEC
Alex Varghese
CISSP | CSSLP | CCSK | CPISI | CEH | ISO 31000 | 2*AWS | 2*Azure | CDP | CDSOE | CC | CKA | CAP | OCI | Togaf9
TCP/IP is a set of communication protocol used for communication between the information system. In this TCP/IP communication, IPsec is one of the protocol that can be used to initiate a secure and authenticated communication between the interconnected systems. It mainly operates in L3 of the OSI model. There are other protocols like TLS/SSL providing the same authenticated and secure communication between the interconnected systems.
IPsec Details : IPsec basically consists of two protocols and two operation modes
IKE
IKE is another concept in IPsec and it's known as the internet key exchange. These are the protocols in the IPsec suite which provides the authenticity and secure communication. IKE uses X509 certificates for the authenticity and Diffie-Hellman algorithm for the key exchange and symmetric key generation. IKE consists of 2 versions, IKEv1 and IKEv2.
Remote Access
Secure remote access can be established using VPN, SSH, SFTP, PPP. If we use VPN, the same can be configured using IPsec/ SSL.
The IPsec VPN communication happens in two phases 1. IKE Phase1 and IKE Phase 2
Both the phases has been diagrammatically represented below:
Cyber Security Leader| LifeLong Learner| Navy Veteran CISSP| CCSP| OSCP| GCIH| CSAP| CISA| CISM|CRISC| CDPSE|GCP*3
1 年Good one