Chapter 6: Authentication

Authentication as a model is very simple: prove your identity. In practice, the concept turns into complex protocols and processes designed to ensure that not only all the authentication information is valid, but protecting that information as well. This chapter details the available authentication mechanisms supported by IPSec and exposes the intense complexity of remote user authentication and the lack of a standard to build upon.

IKE, the automatic key management protocol that supports IPSec SAs, provides several different types of authentication for the systems that provide the termination points of the SA. There are four authentication methods within IKE that provide various options to the peers:

  1. pre-shared ...

Get A Technical Guide to IPSec Virtual Private Networks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.