This chapter addresses the protocols and algorithms that IPsec uses and the different security services that IPsec provides. More precisely, this chapter
• Analyzes the architecture of the IPsec protocol
• Details the role and operational impact of IPsec’s main components
• Describes IPsec modes of operation in various scenarios
• Describes the phases of IPsec connectivity
• Describes the role and component of IKE
• Provides an overview of the operations of IPv6 VPNs
An IP Security (IPsec) virtual private network (VPN) is an essential tool for providing a secure network for business communication. This chapter addresses the different protocols and algorithms that IPsec uses and the different security services that ...