Chapter 6: Authentication

Authentication as a model is very simple: prove your identity. In practice, the concept turns into complex protocols and processes designed to ensure that not only all the authentication information is valid, but protecting that information as well. This chapter details the available authentication mechanisms supported by IPSec and exposes the intense complexity of remote user authentication and the lack of a standard to build upon.

IKE, the automatic key management protocol that supports IPSec SAs, provides several different types of authentication for the systems that provide the termination points of the SA. There are four authentication methods within IKE that provide various options to the peers:

  1. pre-shared ...

Get A Technical Guide to IPSec Virtual Private Networks now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.