IP Security
Abstract
In this chapter, you will learn how IPSec adds another level of security to a TCP/IP network by adding IPSec to the MPLS-based VPN that we built in Chapter 26. We’ll investigate the IPSec architecture and how its features are usually implemented.
You will learn about security associations and how authentication and encapsulation work in IPSec. We’ll briefly mention the Internet key exchange (IKE) as a secure way to move keys around the network.
Keywords
IPSec; Internet key exchange (IKE); PKI architecture; ESP; VPLS; SHA-1
In this chapter, you will learn how IPSec adds another level of security to a TCP/IP network by adding IPSec to the MPLS-based VPN that we built in Chapter 20. We’ll investigate ...
Get The Illustrated Network, 2nd Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.