II. The need for IPSec 3 1. Internet threats 3 2. TCP/IP security vulnerabilities 4 3. The need for IPSec 5
III. What is IPSec 5 1. What is IPSec 5 2. IPSec properties 6
IV. IPSec structure 6 1. Authentication header (AH) 6 2. Encapsulating Security Payload (ESP) 7
V. Security Associations (SA) 8 1. Security Associations 8 2. Combining Security Associations 9 3. SA and key management 10
VI. Building a real VPN with IPSec 11 1. VPN overview 11 2. IPSec in VPN 11
VII. Future Research 13
VIII. Conclusion 14
IX. References 14
I. Abstract * It can be seen clearly that the Internet has developed with a very high speed in many recent years. In the 80s of last century, the Internet was only used in US army, but nowadays, the Internet has come to every country, every home and everyone. However, such fast develops also go along with the increasing number of security issues from the Internet. Therefore there is a need to find a security solution for this issue and that is the season why Internet Protocol Securities exists. * In this paper, i will introduce a overview about this security protocol: what is it? What are its core components? And how this protocol was implemented in the practical? II. The need for IPSec
1. Internet threats * The Internet is quickly changing our world, particularly in the way we do business. The fast development of technology has helped to increase the connection speed of Internet and decrease the cost also. This has given the opportunity for people who know how to take advantage of it. The Internet enables such things as: * Extranets: companies can easily link with their business partners and their customers. In the past, we have to use dial up line with low bandwidth, so we have to wait a bit long to get the connection to a web sites or send messages to our friend via yahoo messenger. But today with the quick development of the technology, the
References: 1. Www.wikipedia.org 2. http://tools.ietf.org/html/rfc2401#section-4.4.3