ابدأ بالتواصل مع الأشخاص وتبادل معارفك المهنية

أنشئ حسابًا أو سجّل الدخول للانضمام إلى مجتمعك المهني.

متابعة

Which protocol is an open standard protocol framework that is commonly used in VPNs, to provide secure end-to-end communications?

user-image
تم إضافة السؤال من قبل Saqib Mehmood , Technical Team Lead/Safety Supervisor , Xchange Technology Group
تاريخ النشر: 2014/02/11
mohamed mustafa mohamed abrahim
من قبل mohamed mustafa mohamed abrahim , System Administrator , Abdul Aziz Saleh Al-Rashed

answer ipsec

Internet Protocol Security (IPsec) is a technology protocol suite for securing Internet

Protocol (IP) communications by authenticating and/or encrypting each IP packet of a

communication session. IPsec also includes protocols for establishing mutual authentication

between agents at the beginning of the session and negotiation of cryptographic keys to be used

during the session.

WINLIYA JEWEL SUNNY KURIANPARAMBIL
من قبل WINLIYA JEWEL SUNNY KURIANPARAMBIL , WordPress Content Writer , Mozilor Technologie Pvt Ltd

Internet Protocol Security

Muhammad Anzar
من قبل Muhammad Anzar , DevOps/DevSecOps Architect , Confidential

IPSec is the secuity enabled open standard protocol. We can use IPSec with two security handshake for end to end communications like Main Office to Branch or Main office to client.

IPSec is a widely used protocol for securing traffic on IP networks which consists of two protocols ESP and AH.

ESP - encrypts the packet's payload (the data it's transporting) with a symmetric key.

AH -  uses a hashing operation on the packet header to help hide certain packet information (like the sender's identity) until it gets to its destination.

Hope you find this useful.

 

Thanks.

Jaher ullah
من قبل Jaher ullah , Core Engineer , Prithvi Information Solutions Ltd (VMC System Ltd)

IPSec is open standard protocol used in VPN technology for authentication and encrypting the data while transmiting fromsource to destication over public network.

IPSec tunnel has been created in two phase.

One is ISAKMP, in this phase we need to provide the authentication key and encryption type(three type)also we need ro provide the security type with transform-set keyword.

In other phase we need to configured crypto map, set the peer, applied the access-list and transform-set value.

Note:- In both side the policy should be same.  

 

 

 

 

 

 

 

Hassan Mohammed Abdullah AlShehri
من قبل Hassan Mohammed Abdullah AlShehri , Network and Communications Administrator , Banque Saudi Fransi

IP sec

NASSRELDEEN IBRAHIM ELTAYP BASHEER
من قبل NASSRELDEEN IBRAHIM ELTAYP BASHEER , Senior Bussiness Solution Support Engineer , MTN Sudan

IPSEC protocal

Tariq Ali
من قبل Tariq Ali , Deputy Manager IT , Kohat Cement Company Limited

IPsec

Mahmoud MohamedAhmed Hamid Ali
من قبل Mahmoud MohamedAhmed Hamid Ali , Technical Support Specialist , Nile River State Information Center

internet Protocol security (IPSec) is a framework of open standards for helping to ensure private, secure communications over Internet Protocol (IP) networks through the use of cryptographic security services. IPSec supports network-level data integrity, data confidentiality, data origin authentication, and replay protection. Because IPSec is integrated at the Internet layer (layer3), it provides security for almost all protocols in the TCP/IP suite, and because IPSec is applied transparently to applications, there is no need to configure separate security for each application that uses TCP/IP.

IPSec helps provide defense-in-depth against :

  • Network-based attacks from untrusted computers, attacks that can result in the denial-of-service of applications, services, or the network
  • Data corruption
  • Data theft
  • User-credential theft
  • Administrative control of servers, other computers, and the network.

المزيد من الأسئلة المماثلة

هل تحتاج لمساعدة في كتابة سيرة ذاتية تحتوي على الكلمات الدلالية التي يبحث عنها أصحاب العمل؟