Please Whitelist This Site?
I know everyone hates ads. But please understand that I am providing premium content for free that takes hundreds of hours of time to research and write. I don't want to go to a pay-only model like some sites, but when more and more people block ads, I end up working for free. And I have a family to support, just like you. :)
If you like The TCP/IP Guide, please consider the download version. It's priced very economically and you can read all of it in a convenient format without ads.
If you want to use this site for free, I'd be grateful if you could add the site to the whitelist for Adblock. To do so, just open the Adblock menu and select "Disable on tcpipguide.com". Or go to the Tools menu and select "Adblock Plus Preferences...". Then click "Add Filter..." at the bottom, and add this string: "@@||tcpipguide.com^$document". Then just click OK.
Thanks for your understanding!
Sincerely, Charles Kozierok
Author and Publisher, The TCP/IP Guide
|
NOTE: Using software to mass-download the site degrades the server and is prohibited. If you want to read The TCP/IP Guide offline, please consider licensing it. Thank you.
|
|
|
|
IPSec Overview, History and Standards
(Page 3 of 3)
IPSec Standards
Since IPSec is actually a collection
of techniques and protocols, it is not defined in a single Internet
standard. Instead, a collection of RFCs defines the architecture, services
and specific protocols used in IPSec. Some of the most important of
these are shown in Table 78,
all of which were published in November 1998:
Table 78: Important IP Security (IPSec) Standards
RFC Number
|
Name
|
Description
|
2401
|
Security
Architecture for the Internet Protocol
|
The main IPSec document, describing
the architecture and general operation of the technology, and showing
how the different components fit together.
|
2402
|
IP
Authentication Header
|
Defines the
IPSec Authentication
Header (AH) protocol used for ensuring
data integrity and origin verification.
|
2403
|
The Use
of HMAC-MD5-96 within ESP and AH
|
Describes a particular encryption
algorithm for use by AH and ESP called Message Digest 5 (MD5), HMAC
variant. (Obviously. J)
|
2404
|
The
Use of HMAC-SHA-1-96 within ESP and AH
|
Describes a
particular encryption algorithm for use by AH and ESP called Secure
Hash Algorithm 1 (SHA-1), HMAC variant. (Naturally. J)
|
2406
|
IP Encapsulating
Security Payload (ESP)
|
Describes the IPSec Encapsulation
Security Payload (ESP) protocol that provides
data encryption for confidentiality.
|
2408
|
Internet
Security Association and Key Management Protocol (ISAKMP)
|
Defines methods
for exchanging keys and negotiating security associations.
|
2409
|
The Internet
Key Exchange (IKE)
|
Describes the Internet
Key Exchange (IKE) protocol used to negotiate
security associations and exchange keys between devices for secure communications.
Based on ISAKMP and OAKLEY.
|
2412
|
The
OAKLEY Key Determination Protocol
|
Describes a
generic protocol for key exchange.
|
The Future of IPSec
Deployment of IPSec has only really
started to take off in the last few years; a major use of the technology
is in implementing virtual private networks (VPNs). It appears that
the future IPSec is bright, as more and more individuals and companies
decide that they need to take advantage of the power of the Internet,
while also protecting the security of the data they transport over it.
If you find The TCP/IP Guide useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider purchasing a download license of The TCP/IP Guide. Thanks for your support! |
|
|
Home -
Table Of Contents - Contact Us
The TCP/IP Guide (http://www.TCPIPGuide.com)
Version 3.0 - Version Date: September 20, 2005
© Copyright 2001-2005 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.
|