session_09_vpn__ipsec__and_tls_101908

Ipsec has government and industry support ipsec

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: onfidentiality (encryption), connectionless integrity, rejection of replayed packets (a form of partial sequence integrity), and limited traffic flow confidentiality. • IPsec has government and industry support. • IPsec allows corporations to select security services according to internal security policies. VPN IPsec IKE v2 TLS M. Mogollon – 01/08 - 12 • IPsec protects traffic transparently on IP packet level. o The operation is completely transparent to the user; no changes in applications, no additional procedures or learning by the user required. • IPsec is "Native-IP”; it is not limited to e.g. operating system specific solutions. o IPsec will be everywhere IP is, unlike tunneling protocols that can typically only be found in specific operating systems,. It will also be a mandatory part of the forthcoming IPv6 standard. • IPsec has a wide variety of strong encryption standards. o Unlike previous solutions, IPsec is a standard where security has been the number one design criteria resulting in unbeatable security. • IPsec includes a secure key management solution with digital certificate support. o IPsec guarantees ease of management and use, even in large scale networks, and highly secure authentication of parties. • IPsec has the widest government and industry support, the latter including leaders in industry such as Entrust, Nortel Networks, Cisco, Microsoft, Network Associates, CheckPoint Software, TimeStep, etc. o A wide, guaranteed deployment ensures interoperability and availability of secure solutions for all needs of corporate and private users. • IPsec is not a single protocol. Instead, IPsec provides a set of security algorithms plus a general framework that allows a pair of communicating entities to use whichever algorithms provide security appropriate for the communication. 12 VPN, IPSec and TLS Internet Protocol (IP) – Security Threats • The Internet protocol has no • Attacks include: security. — Source/destination address & port — — — — IP Spoofing Packet Sniffing Session Hijacking Man-in...
View Full Document

Ask a homework question - tutors are online