VPN
VPN: encapsulating the communication between the two PC’s in an encrypted tunnel that uses strong encryption methods.
IPsec (Internet Protocol Security), is a set of protocols define by the Internet Enginering Task Force (IETF) to provide IP security at the network layer.
IPsec
IPSec based VPN made up of two parts:
- 1. IKE Internet Key Exchange protocol. Introduced 1998 IKEv1 and 2005 IKEv2 (RFC 5996).
IKE ist the initial negotiation phase,..
two endpoints agree on whitch methods will be used to provide security for the IP traffic
IKE is used to manage connections, by defining a set of SA (Security Associations)
one SA for each connection.
SAs are unidirectional, ... there are least two for each IPsec connection.
- 2. ESP Encapsulating Security Payload - IPsec protocols
second part is the IP data being transferred, using the encryption and authentication methods agreed upon IKE negotiation.
Flow
IKE negotiates how IKE should be protected
IKE negotiates how IPsec shoud be protected
IPsec moves data