IPsec and VPN

1397 Words6 Pages

Internet Protocol Security (IPsec) is a set of protocol for establishment of securing Internet Protocol (IP) communications. Safety on data was established through process of authentication and encryption of each IP packet in every communication session. At the beginning of the session, mutual authentication between agents will established and cryptographic keys to be used will arbitrated during the session. IPsec can be applied in protecting data flows not only between pair of hosts and pair of security gateway but also for between a security gateway and a host.

IPsec provided end-to-end security in the Internet Layer of the Internet Protocol Suite. It is different to other Internet security systems which is being use all
…show more content…
VPNs can be either remote-access or site-to-site. In a corporate setting, remote-access VPNs allow employees to access their company 's intranet from home or while traveling away from the office, and site-to-site VPNs allow staff member in geographically disparate offices to share one cohesive virtual network. A VPN also be used to interconnect two similar networks over a dissimilar middle network. VPN systems may be classified by the protocols used to tunnel the traffic, the tunnel 's termination point location, whether they offer site-to-site or remote-access connectivity, the levels of security served or the OSI layer they present to the connecting network.

Therefore, in order to prevent exposure of confidential information, VPNs generally allow only verified remote access and make use of encryption techniques. VPNs provide security by the use of tunneling protocols and through security procedures such as encryption. The VPN security model give confidentiality such that even if the network traffic is sniffed at the packet, an attacker would only see encrypted data, sender authentication to prevent unauthorized users from accessing the VPN and message integrity to detect any occurence of manipulating with transmitted messages

Secure VPN protocols include the following; Internet Protocol Security
Get Access