VPN+IPsec 2
VPN+IPsec 2
VPN Technology :
▪ Virtual private networks (VPNs) are used to create end-to-end private network connections.
▪ A VPN is virtual in that it carries information within a private network, but that information is actually transported over a public network.
▪ A VPN is private in that the traffic is encrypted to keep the data confidential while it is transported across the public network.
VPN Benefits :
▪ Major benefits of VPNs are shown in the table:
IPsec :
▪ IPsec is an IETF standard that defines how a VPN can be secured across IP networks.
▪ IPsec protects and authenticates IP packets between source and destination and provides these essential security functions:
▪ Protocol Encapsulation : Uses Authentication Header (AH) or Encapsulation Security Protocol (ESP).
▪ Confidentiality : Uses encryption algorithms to prevent cybercriminals from reading the packet contents.
▪ Integrity : Uses hashing algorithms to ensure that packets have not been altered between source and destination.
▪ Origin authentication : Uses the Internet Key Exchange (IKE) protocol to authenticate source and destination.
▪ Diffie-Hellman : Used to secure key exchange.
▪ IPsec is not bound to any specific rules for secure communications.
▪ IPsec can easily integrate new security technologies without updating existing IPsec standards.
▪ The open slots in the IPsec framework shown in the figure can be filled with any of the choices that are available for that IPsec
function to create a unique security association (SA).