Communiquez avec les autres et partagez vos connaissances professionnelles

Inscrivez-vous ou connectez-vous pour rejoindre votre communauté professionnelle.

Suivre

Which protocol is an open standard protocol framework that is commonly used in VPNs, to provide secure end-to-end communications?

user-image
Question ajoutée par Saqib Mehmood , Technical Team Lead/Safety Supervisor , Xchange Technology Group
Date de publication: 2014/02/11
mohamed mustafa mohamed abrahim
par mohamed mustafa mohamed abrahim , System Administrator , Abdul Aziz Saleh Al-Rashed

answer ipsec

Internet Protocol Security (IPsec) is a technology protocol suite for securing Internet

Protocol (IP) communications by authenticating and/or encrypting each IP packet of a

communication session. IPsec also includes protocols for establishing mutual authentication

between agents at the beginning of the session and negotiation of cryptographic keys to be used

during the session.

WINLIYA JEWEL SUNNY KURIANPARAMBIL
par WINLIYA JEWEL SUNNY KURIANPARAMBIL , WordPress Content Writer , Mozilor Technologie Pvt Ltd

Internet Protocol Security

Utilisateur supprimé
par Utilisateur supprimé

IPSecurity or secure IP over Internet

Muhammad Anzar
par Muhammad Anzar , DevOps/DevSecOps Architect , Confidential

IPSec is the secuity enabled open standard protocol. We can use IPSec with two security handshake for end to end communications like Main Office to Branch or Main office to client.

Utilisateur supprimé
par Utilisateur supprimé

IPSec is a widely used protocol for securing traffic on IP networks which consists of two protocols ESP and AH.

ESP - encrypts the packet's payload (the data it's transporting) with a symmetric key.

AH -  uses a hashing operation on the packet header to help hide certain packet information (like the sender's identity) until it gets to its destination.

Hope you find this useful.

 

Thanks.

Jaher ullah
par Jaher ullah , Core Engineer , Prithvi Information Solutions Ltd (VMC System Ltd)

IPSec is open standard protocol used in VPN technology for authentication and encrypting the data while transmiting fromsource to destication over public network.

IPSec tunnel has been created in two phase.

One is ISAKMP, in this phase we need to provide the authentication key and encryption type(three type)also we need ro provide the security type with transform-set keyword.

In other phase we need to configured crypto map, set the peer, applied the access-list and transform-set value.

Note:- In both side the policy should be same.  

 

 

 

 

 

 

 

Hassan Mohammed Abdullah AlShehri
par Hassan Mohammed Abdullah AlShehri , Network and Communications Administrator , Banque Saudi Fransi

IP sec

Rohan Sawant
par Rohan Sawant , Technical Support engineer 2 , emc2

IPSEC

NASSRELDEEN IBRAHIM ELTAYP BASHEER
par NASSRELDEEN IBRAHIM ELTAYP BASHEER , Senior Bussiness Solution Support Engineer , MTN Sudan

IPSEC protocal

Tariq Ali
par Tariq Ali , Deputy Manager IT , Kohat Cement Company Limited

IPsec

Mahmoud MohamedAhmed Hamid Ali
par Mahmoud MohamedAhmed Hamid Ali , Technical Support Specialist , Nile River State Information Center

internet Protocol security (IPSec) is a framework of open standards for helping to ensure private, secure communications over Internet Protocol (IP) networks through the use of cryptographic security services. IPSec supports network-level data integrity, data confidentiality, data origin authentication, and replay protection. Because IPSec is integrated at the Internet layer (layer3), it provides security for almost all protocols in the TCP/IP suite, and because IPSec is applied transparently to applications, there is no need to configure separate security for each application that uses TCP/IP.

IPSec helps provide defense-in-depth against :

  • Network-based attacks from untrusted computers, attacks that can result in the denial-of-service of applications, services, or the network
  • Data corruption
  • Data theft
  • User-credential theft
  • Administrative control of servers, other computers, and the network.

More Questions Like This