X-Nico

unusual facts about Ipsec



Similar

IKE

Internet Key Exchange, the protocol used to set up a security association (SA) in the IPsec protocol suite

IMS security

Without the protection with SSL/TLS or IPSec, it will be easy for an attacker to capture the SIP signalling and RTP (Real-time Transport Protocol) traffic using tools like Wireshark.

Internet Mix

Mix profiles exist for IPv4, TCP, VPN (IPsec) and IPv6 traffic, distributions are similar but frame sizes vary given the different overhead and upper layer limitations on MTU.

Netlink

NETLINK XFRM provides an interface to manage the IPsec security association and security policy databases - mostly used by key-manager daemons using the Internet Key Exchange protocol.

Nexus Hawk

Incorporates 2 USB and 4 PCI-M slots to accommodate future networks such as WiMAX and Public Safety Band), accepts ExpressCard 34mm air cards, PCMCIA CardBus air cards and USB air cards via adapter, Secure Remote Configuration Management, Built in IPsec and OpenVPN and pass through security features, FIPS140-2 SSL Certified Module.

NicheStack TCP/IPv4

Also available to run on NicheStack are a number of security modules, including SSH, IPsec/IKE and SSL.

OSI model

Roughly speaking, tunneling protocols operate at the transport layer, such as carrying non-IP protocols such as IBM's SNA or Novell's IPX over an IP network, or end-to-end encryption with IPsec.

Reverse DNS lookup

For example, encryption keys may be placed there for IPsec (RFC 4025), SSH (RFC 4255) and IKE (RFC 4322).

Session border controller

However, the new generations of SBCs, armed with sufficient computing capacity, are able to offload this encryption function from other elements in the network by terminating SIP-TLS, IPsec, and/or SRTP.


see also