Facebook Pixel Code
x
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

IPsec VPN Tunneling Essay Example

Show related essays

IPsec VPN Tunneling

IPsec VPN Tunneling. The goal of the IPsec architecture lies in the provision of various security services for traffic. This happens at the IP layer in both the environment of IPv4 an IPv6 in a more standardized and universal way. The IPSec architecture basically describes system requirements for the implementation of the IPSec. It further focuses on the fundamental elements of the implementation systems and how they fit together into the IP environment. All the security services offered by IPSec protocols are covered in the architecture. In attempts to visualize the IPSec architecture, Doraswamy & Harkins discuss the IPSec Roadmap diagram.IPSec protocols include the following: AH, ESP, IKE, ISAKMP/Oakley and transform.

An understanding of how these components relate to each other gives a clear understanding, implementation and the ability to use IPSec. The IPSec Roadmap defines how these components interact with each other.The standard associated with security architecture is RFC 4301, the standard associated with IP Encapsulating Security Payload (ESP) is RFC 4303 and the standard associated with IP Authenticatication Header is 4302 just to mention but a few. ESP and AH documents define the protocol as well as the services they provide and also define packet processing rules. Their only undoing is their inability to specify the transforms used in the provision of these capabilities. Another component of great concern is the Internet Key Exchange (IKE) which is responsible for the generation of keys for the IPSec protocols. Furthermore, it also negotiates keys for other protocols that may require keys.In the IPSec network layer security, the above stated three components, that is the AH, ESP and IKE, are highly interconnected towards the achievement of IPSec. In this case, AH and ESP rely on an existing security association which is established by the IKE. This is, therefore, an implication that should IKE break then definitely there will be no protection provided by the AH and ESP. IPsec VPN Tunneling.

References

Carrell, J., Chappeli, L., Tittel, E., & Pyles, J. (2012). Guide to TCP/IP (4th ed.). Boston: Cen-gage Learning.

Doraswamy, N., & Harkins, D. (2003). IPSec: The New Security Standard for the Internet. New Jersey, NJ: Prentice Hall Professional.

Doraswamy, N., & Harkins, D. (2014, June). IPSec Architecture. Retrieved from http://www.technet.microsoft.com/en-us/library/cc700826.aspx

Guttman, J. D., Herzog, A. L., & Thayer, F. J. (2000). Authentication and Confidentiality via IPSec. The MITRE Corporation, 45(6), 1-18.

Javin Technologies, Inc. (2013, June). Network Protocols Handbook. Retrieved from http://javintechnologies.com

Minoli, D. (2012). Learner and Non-Learner Video and TV Applications: Using IPv6 and IPv6 Multicast. New Jersey, NJ: John Wiley & Sons.

Tiller, J. S. (2000). A Technical Guide to IPSec Virtual Private Networks. Florida, FL: CRC Press.

Close ✕
Tracy Smith Editor&Proofreader
Expert in: Information Technology, Agriculture, Military
Hire an Editor
Matt Hamilton Writer
Expert in: Information Technology, Technology, Engineering and Construction
Hire a Writer
preview essay on IPsec VPN Tunneling
  • Pages: 6 (1500 words)
  • Document Type: Essay
  • Subject: Information Technology
  • Level: Masters
WE CAN HELP TO FIND AN ESSAYDidn't find an essay?

Please type your essay title, choose your document type, enter your email and we send you essay samples