Logo
Unionpedia
Communication
Get it on Google Play
New! Download Unionpedia on your Android™ device!
Free
Faster access than browser!
 

IPsec

Index IPsec

In computing, Internet Protocol Security (IPsec) is a secure network protocol suite of IPv4 that authenticates and encrypts the packets of data sent over an IPv4 network. [1]

109 relations: Advanced Encryption Standard, Alex Halderman, Algorithm, Application layer, Authentication, Backdoor (computing), Bell Labs, Block cipher, Block cipher mode of operation, Bullrun (decryption program), Bump-in-the-wire, Certificate authority, Columbia University, Communication protocol, Computing, Confidentiality, Cryptographic nonce, DARPA, Data Encryption Standard, Data integrity, Datagram, Device driver, Differentiated services, Diffie–Hellman key exchange, Digital Signal 1, Dynamic Multipoint Virtual Private Network, Encapsulation (networking), Encryption, Equation Group, Explicit Congestion Notification, Galois/Counter Mode, Global surveillance disclosures (2013–present), Hash function, HMAC, Information hiding, Information security, Integrity, International Data Encryption Algorithm, Internet Assigned Numbers Authority, Internet Engineering Task Force, Internet Key Exchange, Internet layer, Internet protocol suite, Internet Security Association and Key Management Protocol, IP fragmentation, IP multicast, IPsec, IPv4, IPv4 header checksum, IPv6, ..., Kaspersky Lab, Kerberized Internet Negotiation of Keys, Kernel (operating system), Key (cryptography), List of DNS record types, List of IP protocol numbers, Logjam (computer security), Maximum transmission unit, MD5, Message authentication, Monotonic function, Mutual authentication, NAT traversal, National Institute of Standards and Technology, National Security Agency, Network address translation, Network packet, Offset (computer science), Open standard, Operating system, Opportunistic encryption, OSI model, Path MTU Discovery, Port (computer networking), PostScript, Pre-shared key, Protocol stack, Public key certificate, Public-key cryptography, Replay attack, Request for Comments, Secure cryptoprocessor, Secure Hash Algorithms, Secure Shell, Security association, Security Parameter Index, Session key, SHA-1, SHA-2, Side-channel attack, Simple Network Management Protocol, Sliding window protocol, SunOS, SwIPe (protocol), Symmetric-key algorithm, Tcpcrypt, The Register, Theo de Raadt, Time to live, Transport layer, Transport Layer Security, Triple DES, Trusted Information Systems, Tunneling protocol, Type of service, United States Naval Research Laboratory, Virtual private network, White House, Zero-day (computing). Expand index (59 more) »

Advanced Encryption Standard

The Advanced Encryption Standard (AES), also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.

New!!: IPsec and Advanced Encryption Standard · See more »

Alex Halderman

J.

New!!: IPsec and Alex Halderman · See more »

Algorithm

In mathematics and computer science, an algorithm is an unambiguous specification of how to solve a class of problems.

New!!: IPsec and Algorithm · See more »

Application layer

An application layer is an abstraction layer that specifies the shared communications protocols and interface methods used by hosts in a communications network.

New!!: IPsec and Application layer · See more »

Authentication

Authentication (from authentikos, "real, genuine", from αὐθέντης authentes, "author") is the act of confirming the truth of an attribute of a single piece of data claimed true by an entity.

New!!: IPsec and Authentication · See more »

Backdoor (computing)

A backdoor is a method, often secret, of bypassing normal authentication or encryption in a computer system, a product, or an embedded device (e.g. a home router), or its embodiment, e.g. as part of a cryptosystem, an algorithm, a chipset, or a "homunculus computer" (such as that as found in Intel's AMT technology).

New!!: IPsec and Backdoor (computing) · See more »

Bell Labs

Nokia Bell Labs (formerly named AT&T Bell Laboratories, Bell Telephone Laboratories and Bell Labs) is an American research and scientific development company, owned by Finnish company Nokia.

New!!: IPsec and Bell Labs · See more »

Block cipher

In cryptography, a block cipher is a deterministic algorithm operating on fixed-length groups of bits, called a block, with an unvarying transformation that is specified by a symmetric key.

New!!: IPsec and Block cipher · See more »

Block cipher mode of operation

In cryptography, a block cipher mode of operation is an algorithm that uses a block cipher to provide an information service such as confidentiality or authenticity.

New!!: IPsec and Block cipher mode of operation · See more »

Bullrun (decryption program)

Bullrun (stylized BULLRUN) is a clandestine, highly classified program to crack encryption of online communications and data, which is run by the United States National Security Agency (NSA).

New!!: IPsec and Bullrun (decryption program) · See more »

Bump-in-the-wire

The term bump-in-the-wire (BITW) refers to a communications device which can be inserted into existing (legacy) systems to enhance the integrity, confidentiality, or reliability of communications across an existing logical link without altering the communications endpoints.

New!!: IPsec and Bump-in-the-wire · See more »

Certificate authority

In cryptography, a certificate authority or certification authority (CA) is an entity that issues digital certificates.

New!!: IPsec and Certificate authority · See more »

Columbia University

Columbia University (Columbia; officially Columbia University in the City of New York), established in 1754, is a private Ivy League research university in Upper Manhattan, New York City.

New!!: IPsec and Columbia University · See more »

Communication protocol

In telecommunication, a communication protocol is a system of rules that allow two or more entities of a communications system to transmit information via any kind of variation of a physical quantity.

New!!: IPsec and Communication protocol · See more »

Computing

Computing is any goal-oriented activity requiring, benefiting from, or creating computers.

New!!: IPsec and Computing · See more »

Confidentiality

Confidentiality involves a set of rules or a promise usually executed through confidentiality agreements that limits access or places restrictions on certain types of information.

New!!: IPsec and Confidentiality · See more »

Cryptographic nonce

In cryptography, a nonce is an arbitrary number that can be used just once.

New!!: IPsec and Cryptographic nonce · See more »

DARPA

The Defense Advanced Research Projects Agency (DARPA) is an agency of the United States Department of Defense responsible for the development of emerging technologies for use by the military.

New!!: IPsec and DARPA · See more »

Data Encryption Standard

The Data Encryption Standard (DES) is a symmetric-key algorithm for the encryption of electronic data.

New!!: IPsec and Data Encryption Standard · See more »

Data integrity

Data integrity is the maintenance of, and the assurance of the accuracy and consistency of, data over its entire life-cycle, and is a critical aspect to the design, implementation and usage of any system which stores, processes, or retrieves data.

New!!: IPsec and Data integrity · See more »

Datagram

A datagram is a basic transfer unit associated with a packet-switched network.

New!!: IPsec and Datagram · See more »

Device driver

In computing, a device driver is a computer program that operates or controls a particular type of device that is attached to a computer.

New!!: IPsec and Device driver · See more »

Differentiated services

Differentiated services or DiffServ is a computer networking architecture that specifies a simple and scalable mechanism for classifying and managing network traffic and providing quality of service (QoS) on modern IP networks.

New!!: IPsec and Differentiated services · See more »

Diffie–Hellman key exchange

Diffie–Hellman key exchange (DH)Synonyms of Diffie–Hellman key exchange include.

New!!: IPsec and Diffie–Hellman key exchange · See more »

Digital Signal 1

Digital Signal 1 (DS1, sometimes DS-1) is a T-carrier signaling scheme devised by Bell Labs.

New!!: IPsec and Digital Signal 1 · See more »

Dynamic Multipoint Virtual Private Network

Dynamic Multipoint Virtual Private Network (DMVPN) is a dynamic tunneling form of a virtual private network (VPN) supported on Cisco IOS-based routers, Huawei AR G3 routers and USG firewalls, and on Unix-like operating systems.

New!!: IPsec and Dynamic Multipoint Virtual Private Network · See more »

Encapsulation (networking)

In computer networking, encapsulation is a method of designing modular communication protocols in which logically separate functions in the network are abstracted from their underlying structures by inclusion or information hiding within higher level objects.

New!!: IPsec and Encapsulation (networking) · See more »

Encryption

In cryptography, encryption is the process of encoding a message or information in such a way that only authorized parties can access it and those who are not authorized cannot.

New!!: IPsec and Encryption · See more »

Equation Group

"Equation Group" is an informal name for the Tailored Access Operations (TAO) unit of the United States National Security Agency (NSA).

New!!: IPsec and Equation Group · See more »

Explicit Congestion Notification

Explicit Congestion Notification (ECN) is an extension to the Internet Protocol and to the Transmission Control Protocol and is defined in RFC 3168 (2001).

New!!: IPsec and Explicit Congestion Notification · See more »

Galois/Counter Mode

Galois/Counter Mode (GCM) is a mode of operation for symmetric key cryptographic block ciphers that has been widely adopted because of its efficiency and performance.

New!!: IPsec and Galois/Counter Mode · See more »

Global surveillance disclosures (2013–present)

Ongoing news reports in the international media have revealed operational details about the United States National Security Agency (NSA) and its international partners' global surveillance of foreign nationals and U.S. citizens.

New!!: IPsec and Global surveillance disclosures (2013–present) · See more »

Hash function

A hash function is any function that can be used to map data of arbitrary size to data of a fixed size.

New!!: IPsec and Hash function · See more »

HMAC

In cryptography, an HMAC (sometimes disabbreviated as either keyed-hash message authentication code or hash-based message authentication code) is a specific type of message authentication code (MAC) involving a cryptographic hash function and a secret cryptographic key.

New!!: IPsec and HMAC · See more »

Information hiding

In computer science, information hiding is the principle of segregation of the design decisions in a computer program that are most likely to change, thus protecting other parts of the program from extensive modification if the design decision is changed.

New!!: IPsec and Information hiding · See more »

Information security

Information security, sometimes shortened to InfoSec, is the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information.

New!!: IPsec and Information security · See more »

Integrity

Integrity is the quality of being honest and having strong moral principles, or moral uprightness.

New!!: IPsec and Integrity · See more »

International Data Encryption Algorithm

In cryptography, the International Data Encryption Algorithm (IDEA), originally called Improved Proposed Encryption Standard (IPES), is a symmetric-key block cipher designed by James Massey of ETH Zurich and Xuejia Lai and was first described in 1991.

New!!: IPsec and International Data Encryption Algorithm · See more »

Internet Assigned Numbers Authority

The Internet Assigned Numbers Authority (IANA) is a function of ICANN, a nonprofit private American corporation that oversees global IP address allocation, autonomous system number allocation, root zone management in the Domain Name System (DNS), media types, and other Internet Protocol-related symbols and Internet numbers.

New!!: IPsec and Internet Assigned Numbers Authority · See more »

Internet Engineering Task Force

The Internet Engineering Task Force (IETF) develops and promotes voluntary Internet standards, in particular the standards that comprise the Internet protocol suite (TCP/IP).

New!!: IPsec and Internet Engineering Task Force · See more »

Internet Key Exchange

In computing, Internet Key Exchange (IKE, sometimes IKEv1 or IKEv2, depending on version) is the protocol used to set up a security association (SA) in the IPsec protocol suite.

New!!: IPsec and Internet Key Exchange · See more »

Internet layer

The internet layer is a group of internetworking methods, protocols, and specifications in the Internet protocol suite that are used to transport datagrams (packets) from the originating host across network boundaries, if necessary, to the destination host specified by an IP address.

New!!: IPsec and Internet layer · See more »

Internet protocol suite

The Internet protocol suite is the conceptual model and set of communications protocols used on the Internet and similar computer networks.

New!!: IPsec and Internet protocol suite · See more »

Internet Security Association and Key Management Protocol

ISAKMP (Internet Security Association and Key Management Protocol) is a protocol defined by RFC 2408 for establishing '''S'''ecurity '''A'''ssociations (SA) and cryptographic keys in an Internet environment.

New!!: IPsec and Internet Security Association and Key Management Protocol · See more »

IP fragmentation

An example of the fragmentation of a protocol data unit in a given layer into smaller fragments. IP fragmentation is an Internet Protocol (IP) process that breaks packets into smaller pieces (fragments), so that the resulting pieces can pass through a link with a smaller maximum transmission unit (MTU) than the original packet size.

New!!: IPsec and IP fragmentation · See more »

IP multicast

IP multicast is a method of sending Internet Protocol (IP) datagrams to a group of interested receivers in a single transmission.

New!!: IPsec and IP multicast · See more »

IPsec

In computing, Internet Protocol Security (IPsec) is a secure network protocol suite of IPv4 that authenticates and encrypts the packets of data sent over an IPv4 network.

New!!: IPsec and IPsec · See more »

IPv4

Internet Protocol version 4 (IPv4) is the fourth version of the Internet Protocol (IP).

New!!: IPsec and IPv4 · See more »

IPv4 header checksum

The IPv4 header checksum is a simple checksum used in version 4 of the Internet Protocol (IPv4) to protect the header of IPv4 data packets against data corruption.

New!!: IPsec and IPv4 header checksum · See more »

IPv6

Internet Protocol version 6 (IPv6) is the most recent version of the Internet Protocol (IP), the communications protocol that provides an identification and location system for computers on networks and routes traffic across the Internet.

New!!: IPsec and IPv6 · See more »

Kaspersky Lab

Kaspersky Lab (/kæˈspɜːrski/; Russian: Лаборатория Касперского, Laboratoriya Kasperskogo) is a multinational cybersecurity and anti-virus provider headquartered in Moscow, Russia and operated by a holding company in the United Kingdom.

New!!: IPsec and Kaspersky Lab · See more »

Kerberized Internet Negotiation of Keys

Kerberized Internet Negotiation of Keys (KINK) is a protocol defined in RFC 4430 used to set up an IPsec security association (SA), similar to Internet Key Exchange (IKE), utilizing the Kerberos protocol to allow trusted third parties to handle authentication of peers and management of security policies in a centralized fashion.

New!!: IPsec and Kerberized Internet Negotiation of Keys · See more »

Kernel (operating system)

The kernel is a computer program that is the core of a computer's operating system, with complete control over everything in the system.

New!!: IPsec and Kernel (operating system) · See more »

Key (cryptography)

In cryptography, a key is a piece of information (a parameter) that determines the functional output of a cryptographic algorithm.

New!!: IPsec and Key (cryptography) · See more »

List of DNS record types

This list of DNS record types is an overview of resource records (RRs) permissible in zone files of the Domain Name System (DNS).

New!!: IPsec and List of DNS record types · See more »

List of IP protocol numbers

Below are the Assigned Internet Protocol Numbers found in the Protocol field of the IPv4 header and the Next Header field of the IPv6 header.

New!!: IPsec and List of IP protocol numbers · See more »

Logjam (computer security)

Logjam is a security vulnerability against a Diffie–Hellman key exchange ranging from 512-bit (US export-grade) to 1024-bit keys.

New!!: IPsec and Logjam (computer security) · See more »

Maximum transmission unit

In computer networking, the maximum transmission unit (MTU) is the size of the largest protocol data unit (PDU) that can be communicated in a single network layer transaction.

New!!: IPsec and Maximum transmission unit · See more »

MD5

The MD5 algorithm is a widely used hash function producing a 128-bit hash value.

New!!: IPsec and MD5 · See more »

Message authentication

In information security, message authentication or data origin authentication is a property that a message has not been modified while in transit (data integrity) and that the receiving party can verify the source of the message.

New!!: IPsec and Message authentication · See more »

Monotonic function

In mathematics, a monotonic function (or monotone function) is a function between ordered sets that preserves or reverses the given order.

New!!: IPsec and Monotonic function · See more »

Mutual authentication

Mutual authentication or two-way authentication refers to two parties authenticating each other at the same time, being a default mode of authentication in some protocols (IKE, SSH) and optional in others (TLS).

New!!: IPsec and Mutual authentication · See more »

NAT traversal

Network address translator traversal is a computer networking technique of establishing and maintaining Internet protocol connections across gateways that implement network address translation (NAT).

New!!: IPsec and NAT traversal · See more »

National Institute of Standards and Technology

The National Institute of Standards and Technology (NIST) is one of the oldest physical science laboratories in the United States.

New!!: IPsec and National Institute of Standards and Technology · See more »

National Security Agency

The National Security Agency (NSA) is a national-level intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence.

New!!: IPsec and National Security Agency · See more »

Network address translation

Network address translation (NAT) is a method of remapping one IP address space into another by modifying network address information in the IP header of packets while they are in transit across a traffic routing device.

New!!: IPsec and Network address translation · See more »

Network packet

A network packet is a formatted unit of data carried by a packet-switched network.

New!!: IPsec and Network packet · See more »

Offset (computer science)

In computer science, an offset within an array or other data structure object is an integer indicating the distance (displacement) between the beginning of the object and a given element or point, presumably within the same object.

New!!: IPsec and Offset (computer science) · See more »

Open standard

An open standard is a standard that is publicly available and has various rights to use associated with it, and may also have various properties of how it was designed (e.g. open process).

New!!: IPsec and Open standard · See more »

Operating system

An operating system (OS) is system software that manages computer hardware and software resources and provides common services for computer programs.

New!!: IPsec and Operating system · See more »

Opportunistic encryption

Opportunistic encryption (OE) refers to any system that, when connecting to another system, attempts to encrypt the communications channel, otherwise falling back to unencrypted communications.

New!!: IPsec and Opportunistic encryption · See more »

OSI model

The Open Systems Interconnection model (OSI model) is a conceptual model that characterizes and standardizes the communication functions of a telecommunication or computing system without regard to its underlying internal structure and technology.

New!!: IPsec and OSI model · See more »

Path MTU Discovery

Path MTU Discovery (PMTUD) is a standardized technique in computer networking for determining the maximum transmission unit (MTU) size on the network path between two Internet Protocol (IP) hosts, usually with the goal of avoiding IP fragmentation.

New!!: IPsec and Path MTU Discovery · See more »

Port (computer networking)

In computer networking, a port is an endpoint of communication in an operating system, which identifies a specific process or a type of network service running on that system.

New!!: IPsec and Port (computer networking) · See more »

PostScript

PostScript (PS) is a page description language in the electronic publishing and desktop publishing business.

New!!: IPsec and PostScript · See more »

Pre-shared key

In cryptography, a pre-shared key (PSK) is a shared secret which was previously shared between the two parties using some secure channel before it needs to be used.

New!!: IPsec and Pre-shared key · See more »

Protocol stack

The protocol stack or network stack is an implementation of a computer networking protocol suite or protocol family.

New!!: IPsec and Protocol stack · See more »

Public key certificate

In cryptography, a public key certificate, also known as a digital certificate or identity certificate, is an electronic document used to prove the ownership of a public key.

New!!: IPsec and Public key certificate · See more »

Public-key cryptography

Public-key cryptography, or asymmetric cryptography, is any cryptographic system that uses pairs of keys: public keys which may be disseminated widely, and private keys which are known only to the owner.

New!!: IPsec and Public-key cryptography · See more »

Replay attack

A replay attack (also known as playback attack) is a form of network attack in which a valid data transmission is maliciously or fraudulently repeated or delayed.

New!!: IPsec and Replay attack · See more »

Request for Comments

In information and communications technology, a Request for Comments (RFC) is a type of publication from the technology community.

New!!: IPsec and Request for Comments · See more »

Secure cryptoprocessor

A secure cryptoprocessor is a dedicated computer on a chip or microprocessor for carrying out cryptographic operations, embedded in a packaging with multiple physical security measures, which give it a degree of tamper resistance.

New!!: IPsec and Secure cryptoprocessor · See more »

Secure Hash Algorithms

The Secure Hash Algorithms are a family of cryptographic hash functions published by the National Institute of Standards and Technology (NIST) as a U.S. Federal Information Processing Standard (FIPS), including.

New!!: IPsec and Secure Hash Algorithms · See more »

Secure Shell

Secure Shell (SSH) is a cryptographic network protocol for operating network services securely over an unsecured network.

New!!: IPsec and Secure Shell · See more »

Security association

A Security Association (SA) is the establishment of shared security attributes between two network entities to support secure communication.

New!!: IPsec and Security association · See more »

Security Parameter Index

The Security Parameter Index (SPI) is an identification tag added to the header while using IPsec for tunneling the IP traffic.

New!!: IPsec and Security Parameter Index · See more »

Session key

A session key is a single-use symmetric key used for encrypting all messages in one communication session.

New!!: IPsec and Session key · See more »

SHA-1

In cryptography, SHA-1 (Secure Hash Algorithm 1) is a cryptographic hash function which takes an input and produces a 160-bit (20-byte) hash value known as a message digest - typically rendered as a hexadecimal number, 40 digits long.

New!!: IPsec and SHA-1 · See more »

SHA-2

SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA).

New!!: IPsec and SHA-2 · See more »

Side-channel attack

In computer security, a side-channel attack is any attack based on information gained from the implementation of a computer system, rather than weaknesses in the implemented algorithm itself (e.g. cryptanalysis and software bugs).

New!!: IPsec and Side-channel attack · See more »

Simple Network Management Protocol

Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior.

New!!: IPsec and Simple Network Management Protocol · See more »

Sliding window protocol

A sliding window protocol is a feature of packet-based data transmission protocols.

New!!: IPsec and Sliding window protocol · See more »

SunOS

SunOS is a Unix-branded operating system developed by Sun Microsystems for their workstation and server computer systems.

New!!: IPsec and SunOS · See more »

SwIPe (protocol)

The swIPe IP Security Protocol (swIPe) is an experimental Internet Protocol (IP) security protocol that was specified in 1993.

New!!: IPsec and SwIPe (protocol) · See more »

Symmetric-key algorithm

Symmetric-key algorithms are algorithms for cryptography that use the same cryptographic keys for both encryption of plaintext and decryption of ciphertext.

New!!: IPsec and Symmetric-key algorithm · See more »

Tcpcrypt

In computer networking, tcpcrypt is a transport layer communication encryption protocol.

New!!: IPsec and Tcpcrypt · See more »

The Register

The Register (nicknamed El Reg) is a British technology news and opinion website co-founded in 1994 by Mike Magee, John Lettice and Ross Alderson.

New!!: IPsec and The Register · See more »

Theo de Raadt

Theo de Raadt (born May 19, 1968) is a software engineer who lives in Calgary, Alberta, Canada.

New!!: IPsec and Theo de Raadt · See more »

Time to live

Time to live (TTL) or hop limit is a mechanism that limits the lifespan or lifetime of data in a computer or network.

New!!: IPsec and Time to live · See more »

Transport layer

In computer networking, the transport layer is a conceptual division of methods in the layered architecture of protocols in the network stack in the Internet Protocol Suite and the OSI model.

New!!: IPsec and Transport layer · See more »

Transport Layer Security

Transport Layer Security (TLS) – and its predecessor, Secure Sockets Layer (SSL), which is now deprecated by the Internet Engineering Task Force (IETF) – are cryptographic protocols that provide communications security over a computer network.

New!!: IPsec and Transport Layer Security · See more »

Triple DES

In cryptography, Triple DES (3DES), officially the Triple Data Encryption Algorithm (TDEA or Triple DEA), is a symmetric-key block cipher, which applies the DES cipher algorithm three times to each data block.

New!!: IPsec and Triple DES · See more »

Trusted Information Systems

Trusted Information Systems (TIS) was a computer security research and development company during the 1980s and 1990s, performing computer and communications (information) security research for organizations such as NSA, DARPA, ARL, AFRL, SPAWAR, and others.

New!!: IPsec and Trusted Information Systems · See more »

Tunneling protocol

In computer networks, a tunneling protocol is a communications protocol that allows for the secure movement of data from one network to another.

New!!: IPsec and Tunneling protocol · See more »

Type of service

The type of service (ToS) field in the IPv4 header has had various purposes over the years, and has been defined in different ways by five RFCs.

New!!: IPsec and Type of service · See more »

United States Naval Research Laboratory

The United States Naval Research Laboratory (NRL) is the corporate research laboratory for the United States Navy and the United States Marine Corps.

New!!: IPsec and United States Naval Research Laboratory · See more »

Virtual private network

A virtual private network (VPN) extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network.

New!!: IPsec and Virtual private network · See more »

White House

The White House is the official residence and workplace of the President of the United States.

New!!: IPsec and White House · See more »

Zero-day (computing)

A zero-day (also known as 0-day) vulnerability is a computer-software vulnerability that is unknown to those who would be interested in mitigating the vulnerability (including the vendor of the target software).

New!!: IPsec and Zero-day (computing) · See more »

Redirects here:

Authentication Header, Encapsulating Security Payload, IP Security, IPSEC, IPSec, IPSecME, IPsec implementations, IPsec tunnelling, Internet Protocol Security, Ip security, Ipsec.

References

[1] https://en.wikipedia.org/wiki/IPsec

OutgoingIncoming
Hey! We are on Facebook now! »