In Part 1 of this article, we talked about security issues related to sending and receiving IP packets and the function of IP Security, or IPSec. We also discussed different levels of security and ...
As discussed above, IPsec delivers data confidentiality services by executing a transform on plain text data. Common ciphers used in the IPsec transform are DES, 3DES, and AES. All of these transforms ...
I've got an IPsec tunnel (ike1, SHA, 3DES) between two routers in two locations. One end is a single /16 with a 20mbps pipe, and the other end is two /16 subnets with a 100mbps pipe. The routers are ...
The vast majority of administrators go to great lengths to protect the files on their network. Typically, elaborate firewalls are used to keep outsiders away from file servers. The files residing on ...
The majority of computer and iAppliance users connect to their networks simply to exchange e-mail messages and small files such as Word documents or PowerPoint presentations. These applications are ...
The use of IPsec is pervasive throughout the networking industry. However, many organizations are using IPsec in sub-optimal configurations that result in weaker connection security. Many ...
When the idea of MPLS VPNs was first discussed, there was a strong notion of competition between MPLS VPNs and IPsec VPNs. Many people voiced concern that MPLS VPN technology does not add significant ...
Real-world communications over the Internet are becoming more and more widespread. In particular, commercial transactions, which deserve a high level of security, often take place over our ...