Internet Protocol Security



Several projects currently provide development and implementation of IPsec tools. The original IPsec tools are provided by the KAME project, www.kame.net. Current versions can be obtained from souceforge.net/projects/ipsectools. RPM packages can be obtained from rpmfind.net. Other IPsec tool projects include the Free Secure/Wide Area Network project (FreeS/WAN) at www.freeeswan.org, which provides a Linux implementation of IPsec tools, and VPN Consortium (VPNC) at www.vpnc.org, which supports Windows and Macintosh versions. FreeS/WAN provides both Red Hat RPM packages and source code for their tools.


IPsec is made up of several protocols that provide authentication (AH), encryption (ESP), and the secure exchange of encryption keys (IKE). The Authentication Header protocol (AH) confirms that the packet was sent by the sender, and not by someone else. IPsec also includes an integrity check to detect any tampering in transit. Packets are encrypted using the Encapsulating Security Payload (ESP). Encryption and decryption are performed using secret keys shared by the sender and the receiver. These keys are themselves transmitted using the Internet Key Exchange protocol, which provides a secure exchange. ESP encryption can degrade certain compression transmission methods like PPP for dialup Internet connections. To accommodate these compression methods, IPsec provides the IP Payload Compression Protocol (IPComp), with which packets can be compressed before being sent.
The AH, ESP, and IPComp protocols are incorporated into the Linux kernel. The IKE protocol is implemented as a separate daemon. It simply provides a way to share secret keys, and can be replaced by other sharing methods.


Related Posts:
  • EMAIL BULK SERVICE Email marketing is a powerful channel but also one that presents many questions and difficulties. In their 2012 Email marketing benchmark, marketingsherpa surveyed 2,735 companies and asked them to rank the significance o… Read More
  • What Is IP Filtering? IP filtering is simply a mechanism that decides which types of IP packets will be processed normally and which will be dropped or rejected. By dropped we mean that the packet is deleted and completely ignored, as if it h… Read More
  • hosting server Web Hosting free web hosting-free hosting 12:15 Web hosting Awardspace is a free web hosting provider with no ads, paid web hosting, vpshosting, reseller hosting, domain nam… Read More
  • Web Hosting or DNS It is common sense that if a web site is down it cannot get spidered, but we’ll state it regardless:When a site is down, it cannot get spidered.And when your domain’s designated DNS is down, yoursite cannot get spidered ei… Read More
  • Securing FTP-How  Securing FTP You can make your FTP uploads and downloads more secure in one of two ways: through Secure File Transfer Protocol SFTP or Transport Layer Security TLS. SFTPSFTP is a more secure way of uploading and downlo… Read More
  • purchase domains Domain Names | Register Your Domain Name In India - GoDaddy in.godaddy.com/ GoDaddy makes registering Domain Names fast, simple, and affordable. Find out why so many business owners chose GoDaddy to be their … Read More
  • What is Internet domain? Internet Domains  In database design and management, the set of valid values for a given attribute. For example, the domain for the attribute AREA-CODE might be the list of all valid three-digit numeric telephone are… Read More
  • Session Hijacking-Protection Session hijacking isn't new to computer security. The term is most commonly used to describe the process of a TCP connection taken over by a sequence prediction attack. In such an attack, the attacker gains control of … Read More
  • Top website design tips website programmers should be to make the website experience as easy and pleasant for the user as possible. Clearly, well-designed pages with easily navigable layout are central to this, but they're not the whole story.… Read More
  • What is ActiveX A set of technologies that enables software components to interact with one another in a networked environment, regardless of the language in which the components were created. ActiveX, which was developed by Microsoft in… Read More
  • Web and Database Port Listing Table A-1. HTTP/1.1 Methods and Field Definitions Web and Database Port Listing Port Server 66 Oracle SQL*Net 80 Hyper Text Transfer Protocol (HTTP) 81 HTTP Proxy, Alternativ… Read More
  • Server-Based Anti-Spam (adsbygoogle = window.adsbygoogle || []).push({}); The single biggest hurdle when hosting your own e-mail addresses is filtering spam. If you have an account with Gmail, Yahoo! Mail, or one of the other many free e-… Read More
  • Why B2B website needed? Short for business-to-business. The electronic exchange of products and services between businesses without the direct involvement of consumers. B2B’s effects on business include streamlining purchasing, accounting, and o… Read More
  • website domain names Web Hosting - UK Website Hosting and Domain Names - LCN.com Buy reliable UK web hosting packages, powerful server solutions, and great value domain names from LCN.com. UK based technical support on hand 7 days a week. Domai… Read More
  • voip test VoIP Speed, Bandwidth, and Jitter Test | WhichVoIP.com Free VoIP speed test tool that performs a bandwidth test, jitter test, and a packet loss  test on your Internet connection to determine VoIP compatibility. Intern… Read More