Chapter 10. IPsec VPN Design Considerations
This chapter covers the following topics:
• IPsec Modes of Operation and Security Options
• Site-to-Site Deployment Examples
Oh, how much is today hidden by science! Oh, how much it is expected to hide! —Friedrich Nietzsche, The Genealogy of Morals, 1887
Private information is practically the source of every large modern fortune. —Oscar Wilde, An Ideal Husband, 1895
Virtual private networks (VPNs) are a means to establish a private network over any other network. Typically, the “other” network is deemed insecure, so traffic sent over it requires some kind of extra protection. The most common example ...
Get Network Security Architectures now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.