VPN: Unterschied zwischen den Versionen
6vffdh (Diskussion | Beiträge) |
6vffdh (Diskussion | Beiträge) |
||
Zeile 6: | Zeile 6: | ||
IPSec based VPN made up of two parts: | IPSec based VPN made up of two parts: | ||
*1. IKE Internet Key Exchange protocol | *1. IKE Internet Key Exchange protocol | ||
− | |||
<q>IKE ist the initial negotiation phase,..</q><br /> | <q>IKE ist the initial negotiation phase,..</q><br /> | ||
Zeile 13: | Zeile 12: | ||
<q>one SA for each connection.</q><br /> | <q>one SA for each connection.</q><br /> | ||
<q>SAs are unidirectional, ... there are least two for each IPsec connection.</q><br /> | <q>SAs are unidirectional, ... there are least two for each IPsec connection.</q><br /> | ||
+ | |||
+ | *2. ESP Encapsulating Security Payload - IPsec protocols | ||
+ | <q>second part is the IP data being transferred, using the encryption and authentication methods agreed upon IKE negotiation.</q><br /> | ||
+ | |||
=PPTP= | =PPTP= | ||
=L2TP= | =L2TP= | ||
=SSL-VPN= | =SSL-VPN= |
Version vom 17. März 2019, 09:19 Uhr
VPN: encapsulating the communication between the two PC’s in an encrypted tunnel that uses strong encryption methods.
IPsec (Internet Protocol Security), is a set of protocols define by the Internet Enginering Task Force (IETF) to provide IP security at the network layer.
IPsec
IPSec based VPN made up of two parts:
- 1. IKE Internet Key Exchange protocol
IKE ist the initial negotiation phase,..
two endpoints agree on whitch methods will be used to provide security for the IP traffic
IKE is used to manage connections, by defining a set of SA (Security Associations)
one SA for each connection.
SAs are unidirectional, ... there are least two for each IPsec connection.
- 2. ESP Encapsulating Security Payload - IPsec protocols
second part is the IP data being transferred, using the encryption and authentication methods agreed upon IKE negotiation.