Chapter 13. IPsec
This chapter covers the following topics:
Types of IPsec VPNs— This section lays out the two main types of IPsec VPNs.
Composition of IPsec— This section introduces the protocols that are combined to create the IPsec protocol suite.
Introduction to IKE— This section discusses some of the basic information about IKE and how it works in the context of the IPsec protocol.
IPsec Negotiation Using the IKE Protocol— This section talks about how IKE is used to negotiate IPsec tunnels between two peers. Packet-by-packet details of all transactions are given for main mode, aggressive mode, and quick mode negotiations.
IKE Authentication Methods— This section discusses the IKE authentication methods while focusing on the most important ...
Get Network Security Principles and Practices now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.