an introduction to ip security (ipsec) encryption

an introduction to ip security (ipsec) encryption - Cisco -...

Info iconThis preview shows pages 1–5. Sign up to view the full content.

View Full Document Right Arrow Icon
An Introduction to IP Security (IPSec) Encryption Contents: Warning Purpose Background Crypto Lingo Configuration of IKE IPSec Configuration Memory and CPU considerations Output From show Commands Sample Configurations Debug Output Implementation Tips Help and Relevant Links References Warning There are severe restrictions on the export of "strong" cryptography. If you violate U.S. Federal Law, then you, not Cisco, will be held accountable! If you have any questions regarding export control, please send email to export@cisco.com . Purpose The purpose of this document is to introduce IPSec to users in a rapid, but concise format. You will see basic configurations of Internet Key Exchange (IKE) with pre-shared keys, IKE with a Certification Authority, and IPSec. This is not an exhaustive document. This document will, however, help you to understand the tasks and the order in which they are accomplished. Cisco - An Introduction to IP Security (IPSec) Encryption http://www.cisco.com/warp/public/105/IPSECpart1.html (1 of 2) [7/18/2001 9:01:19 AM]
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Return to top Return to table of contents Go to next section All contents are Copyright © 1992--2001 Cisco Systems Inc. All rights reserved. Important Notices and Privacy Statement . Cisco - An Introduction to IP Security (IPSec) Encryption http://www.cisco.com/warp/public/105/IPSECpart1.html (2 of 2) [7/18/2001 9:01:19 AM]
Background image of page 2
An Introduction to IP Security (IPSec) Encryption Background IPSec is the next-generation network layer crypto platform for Cisco's security platforms (Cisco IOS® Software, PIX, and so on). Originally described in RFCs 1825-1829, which are now obsolete, IPSec is currently discussed in a number of documents presented by the IETF IP Security Working Group . IPSec currently supports IP version 4 unicast packets. IPv6 and multicast support is coming later. IPSec has the following strengths over current Cisco crypto offerings: Multivendor: Since the IPSec framework is standardized, customers are not locked into any specific vendor's product. You will find IPSec on routers, firewalls, and client desktops (Windows, Mac, and so on). 1. Scalability: IPSec was designed with large enterprises in mind and therefore, it has "built-in" key management. 2. Note: While several Cisco platforms can use IPSec, this document is geared towards Cisco IOS Software. Return to previous section Return to table of contents Go to next section All contents are Copyright © 1992--2001 Cisco Systems Inc. All rights reserved. Important Notices and Privacy Statement . Cisco - An Introduction to IP Security (IPSec) Encryption http://www.cisco.com/warp/public/105/IPSECpart2.html [7/18/2001 9:01:45 AM]
Background image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
An Introduction to IP Security (IPSec) Encryption Crypto Lingo (Vocabulary) You need to know the following terms to understand IPSec, and to read the rest of this document. When you see acronyms in other portions of this document, refer to this page for definitions. Authentication Header (AH):
Background image of page 4
Image of page 5
This is the end of the preview. Sign up to access the rest of the document.

Page1 / 38

an introduction to ip security (ipsec) encryption - Cisco -...

This preview shows document pages 1 - 5. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online