Thursday, March 15, 2012

IP Security ( IP Sec) which was developed by the IETF VPN

The are some disadvantages of tunneling.  It is difficult to manage a large number of tunnels.  Therefore, it doesn't scale well to a large number of VPN nodes.  Further, the packets on the unencrypted tunnels can be eavesdropped by others attached to the shared network infrastructure.  This tunnel is especially vulnerable at tunnel end-point where the 9extra headers are stripped away and packets are visible in their original forms As tunneling doesn't ensure privacy, this is clearly a problem for organizations who wants to use public networks , especially the internet to transmit important information (Yuricik & Doss, 2001).  The evolving standard for network layer encryption is IP Security ( IP Sec) which was developed by the IETF.  It is a layer 3 protocol standard designed to insure data security  in IP based communications. IPSec allows IP payloads to be encrypted and encapsulated in an IP header for secure transfer.(Younglove, 2000).  IPSec supports two types of encapsulation which are used in combination: authentication header (AH) and encapsulating security payload (ESP).  AH provides secure source identification and data integrity verification using a header field.  ESP supports payload encryption for confidentiality and has two modes: tunnel mode for WAN traffic (the entire packet, including source and destination addresses is encrypted to prevent traffic analysis) and the transport mode (only the payload is encrypted ) for LAN traffic(Yuricik & Doss,

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.