a technical guide to ipsec virtual private networks

378 568 0
a technical guide to ipsec virtual private networks

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

[...]... the available tools and equipment Of the technical data that was available, it still seemed to glean over the details that interested this author No one else seemed to tackle them in a clear and understandable fashion, and simply stated or reinforced the RFCs that defined the standard It was felt that other individuals had a similar desire to know the fine points of IPSec and wanted a book that explained... complicated and open to interpretation, such as IKE (the automatic key management) However, IPSec- specific operations, such as the use of security protocols, are fairly straightforward and the implementation options, with regard to automatic key management, are what need to be conveyed carefully The part that always seems to get attention in the realm of IPSec is the agreement of policy, authentication, and... now attainable Soon, the data became increasingly more complex and large, requiring more computers and educated people to operate and manage them As this expanded, the information became an integral part of the business success, and the protection of that data soon became a focal point for some organizations It was at this point, when assets veered away from machines, widgets, and warehouses to data,... solution In the absence of a standard, anything is fair game Access Controls Access controls limit access to network and system resources based on communication attributes such as authentication data, traffic patterns or type, protocol, application, or any identifying characteristics of the communication that an administrator wishes to allow or stop Examples of simple access controls are ACLs, or access control... controls but they also allow the administrator to provide various protection levels to various communication patterns and flows Much more of this is covered in detail in later chapters Data Integrity Data integrity is the validity of the data at any given state There are three basic states of data: 1 storage 2 processing 3 transmission Typically, data in storage and being transmitted are the focal points of... authentication requirements Two-factor authentication is an example of something a user knows and something the user has that uniquely identifies that user A normal username and password authentication process can have its own overhead in the maintenance of ensuring that passwords are a certain length and are changed regularly However, two-factor authentication typically requires hardware in the form of a token... process that produces a fingerprint that is transmitted with the original data As the message and the checksum reach the destination, the recipient can verify that the data has not been altered in transit by verifying the checksum AU0876/frame/ch01 Page 6 Monday, October 30, 2000 2:23 PM 6 A Technical Guide to IPSec Virtual Private Networks IPSec provides data integrity by employing message authentication... information into unintelligible data and, typically, back into the original information and format given a specific key, password, or any private data or device Non-repudiation Non-repudiation is the inability to transmit information and then claim not having done so In the nontechnical domain, papers can be signed, authorized, and witnessed to provide a legal binding between the person and the activity,... key is obtained and used to modify the data, obtaining the necessary information to create an alternate authentication is highly complex The details of message authentication and its application in IPSec are discussed in later chapters Confidentiality Confidentiality is the ability to keep the data private and unexposed to unauthorized viewers In the realm of communication security, confidentiality is... PM xx A Technical Guide to IPSec Virtual Private Networks The concept of VPNs is a relatively old one — at least in computer years — but as a well-defined technology, it remains an adolescent This is certainly understandable given the environment An ever-changing landscape of applications, circumstances, protocols, operating systems, and the ever-present legacy systems that must be addressed is a tough . class="bi x0 y0 w0 h0" alt="" IPSec Virtual Private Networks A Technical Guide to A Standard for Auditing Computer Applications Martin Krist ISBN: 0-8493-9983-1 A Technical Guide to IPSec Virtual Private. PUBLICATIONS Boca Raton London New York Washington, D.C. IPSec Virtual Private Networks A Technical Guide to JAMES S. TILLER CISSP, CCNA, CCDA, MCSE+I This book contains information obtained. Framework 164 ISAKMP Header 164 Generic Payload Header 166 Security Association Payload 166 Proposal Payload 166 Transform Payload 169 Identification Payload 170 Certificate Payload 170 Certificate

Ngày đăng: 25/03/2014, 11:03

Mục lục

  • Front cover

  • Dedication

  • Contents

  • Foreword

  • Acknowledgments

  • Introduction

  • Chapter 1. Getting Started

  • Chapter 2. Technical Primer

  • Chapter 3. IP Security Primer

  • Chapter 4. Cryptography

  • Chapter 5. Implementation Theory

  • Chapter 6. Authentication

  • Chapter 7. IPSec Architecture

  • Chapter 8. Security Protocols

  • Chapter 9. Key Management

  • Chapter 10. IKE in Action

  • Chapter 11. Areas of Interest within IKE

  • Chapter 12. Security Policies and the Security of VPNs

  • Chapter 13. Implementation Considerations

  • Chapter 14. Product Evaluation

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan