About this book
Now that the Internet has blossomed into the Information Superhighway with its traffic and drivers becoming increasingly diverse, security has emerged as a primary concern. This innovative, new book offers you a global, integrated approach to providing Internet Security at the network layer. You get a detailed presentation of the revolutionary IPsec technology used today to create Virtual Private Networks and, in the near future, to protect the infrastructure of the Internet itself. The book addresses IPsec's major aspects and components to help you evaluate and compare features of different implementations. It gives you a detailed understanding of this cutting-edge technology from the inside, which enables you to more effectively troubleshoot problems with specific products. Based on standards documents, discussion list archives, and practitioners' lore, this one-of-a-kind resource collects all the current knowledge of IPsec and describes it in a literate, clear manner.
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app.
Information
Table of contents
- Contents vii
- Preface xvii
- 1 Introduction 1
- 2 The First Puzzle Piece: The Authentication Header 15
- 3 The Second Puzzle Piece: The Encapsulating Security Payload 41
- 4 The Third Puzzle Piece: The Cryptographic Algorithms 59
- 5 The Fourth Puzzle Piece: The Internet Key Exchange (IKE) 87
- 6 The Fifth Puzzle Piece: IKE and the Road Warrior 129
- 7 The Sixth Puzzle Piece: IKE Frills and Add-Ons 153
- 8 The Glue: PF_KEY 165
- 9 The Missing Puzzle Piece: Policy Setting and Enforcement 179
- 10 The Framework: Public Key 207
- 11 The Unsolved Puzzle: Secure IP Multicast 229
- 12 The Whole Puzzle: Is IPsec the Correct Solution? 243
- List of Acronyms and Abbreviations 251
- About the Author 261
- Index 263
