This book is not available from inventory but can be printed at your request and delivered within weeks of receipt of order. Home Login My Account. Cart 0. Change Location. Demystifying the IPsec Puzzle.
|Published (Last):||19 July 2008|
|PDF File Size:||11.82 Mb|
|ePub File Size:||6.28 Mb|
|Price:||Free* [*Free Regsitration Required]|
This book is not available from inventory but can be printed at your request and delivered within weeks of receipt of order. Home Login My Account. Cart 0. Change Location. Demystifying the IPsec Puzzle. By author : Sheila Frankel. Description Contents Author Reviews Now that the Internet has blossomed into the Information Superhighway with its traffic and drivers becoming increasingly diverse, security has emerged as a primary concern.
This innovative, new book offers you a global, integrated approach to providing Internet Security at the network layer. You get a detailed presentation of the revolutionary IPsec technology used today to create Virtual Private Networks and, in the near future, to protect the infrastructure of the Internet itself.
The book addresses IPsec's major aspects and components to help you evaluate and compare features of different implementations. It gives you a detailed understanding of this cutting-edge technology from the inside, which enables you to more effectively troubleshoot problems with specific products. Based on standards documents, discussion list archives, and practitioners' lore, this one-of-a-kind resource collects all the current knowledge of IPsec and describes it in a literate, clear manner.
Introducing IPsec. Further Reading. Security Associations and the Security Parameters Index. AH Format. AH Location. AH Modes. Nested Headers. Implementing IPsec Header Processing. AH Processing for Outbound Messages. AH Processing for Inbound Messages. Threat Mitigation. ESP Header Format. Nested and Adjacent Headers.
Complications Criticisms and Counterclaims. Why Two Security Headers? Authentication Algorithms. Public Key Cryptography. Payloads and Exchanges.
Authentication Methods. Proposals and Counterproposals. The Security Association Payload. The Proposal Payload. The Message ID. Identities and Identity Protection. Certificates and Certificate Requests. Keys and Diffie-Hellman Exchanges. Vendor IDs. The Phase 1 Negotiation. The Phase 2 Negotiation. New Group Mode. Informational Exchanges.
The Generic Payload Header. The Origins of IDE. An Example. Criticisms and Counterclaims. Extended Authentication. Hybrid Authentication. Challenge-Response for Authenticated Cryptographic Keys. User-Level Authentication.
Credential-Based Approaches. Initial Contact. Dangling SAs. Composition of PF Key Messages. The Policy Problem. Revisiting the Road Warrior.
IPsec Policy Solutions. The Life Cycle of a Certificate. Certificates and CRTs. Certificate Formats. Certificate Contents. IKE and Ipsec Considerations. Summary Further Reading. Multicast Logistics. Functional Requirements. Security Management. Whither IP Multicast Security? Disadvantages of IPsec. Alternatives to IPsec. IPsec Today. The Future of IPsec. She holds a B. Print Book.
Demystifying the Ipsec Puzzle
Demystifying the IPsec Puzzle