Chapter 8: Security Protocols

This chapter details the foundation of IPSec — the security protocols. IPSec leverages the se curity protocols to provide useful communication within the VPN. They are the workhorses that everything else is designed to support.

Security associations are established and maintained by the security protocol implemented. Security protocols are the heart of IPSec operations and their implementation determines transport or tunnel mode. Security protocols can be used in combination or nested to extend the VPN and its functionality.

There are two security protocols defined by IPSec — Authentication Header (AH) and Encapsulating Security Payload (ESP) — that are used to provide authentication, integrity, and, with ESP, ...

Get A Technical Guide to IPSec Virtual Private Networks now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.