Xem mẫu

Chapter 13. IPsec Fundamentals © 2012 Cisco and/or its affiliates. All rights reserved. 1 Contents This chapter addresses the protocols and algorithms that IPsec uses and the different security services that IPsec provides. • Analyzes the architecture of the IPsec protocol • Details the role and operational impact of IPsec’s main components • Describes IPsec modes of operation in various scenarios • Describes the phases of IPsec connectivity • Describes the role and component of IKE • Provides an overview of the operations of IPv6 VPNs © 2012 Cisco and/or its affiliates. All rights reserved. 2 IPsec Framework • An IP Security (IPsec) virtual private network (VPN) is an essential tool for providing a secure network for business communication. • IPsec works at the network layer, protecting and authenticating IP packets between participating IPsec devices (peers). • IPsec is not bound to any specific encryption, authentication, or security algorithms or keying technology. • IPsec is a framework of open standards. © 2012 Cisco and/or its affiliates. All rights reserved. 3 IPsec Framework • Confidentiality • Integrity • Authentication • Username and password • One-time password • Biometric • Preshared keys (PSK) • Digital certificates • Antireplay protection © 2012 Cisco and/or its affiliates. All rights reserved. 4 Encryption Algorithms • The following are some of the encryption algorithms and key lengths that VPNs use: – Date Encryption Standard (DES) – 3DES – Advanced Encryption Standard (AES) – Rivest, Shamir, and Adleman (RSA) – Software-Optimized Encryption Algorithm (SEAL) algorithm © 2012 Cisco and/or its affiliates. All rights reserved. 5 ... - tailieumienphi.vn
nguon tai.lieu . vn