From the course: Certified Ethical Hacker (CEH)

Unlock this course with a free trial

Join today to access over 24,600 courses taught by industry experts.

Surveying IPsec implementations and modern VPN implementations

Surveying IPsec implementations and modern VPN implementations

From the course: Certified Ethical Hacker (CEH)

Surveying IPsec implementations and modern VPN implementations

- [Instructor] IPsec, or the Internet Protocol Security, is a protocol that is used to provide secure communications over the IP networks and, of course, over untrusted networks like the internet and has been used for many, many, many years. It is designed to ensure confidentiality, integrity, and the authenticity of the IP packets that are being sent between two devices. Now, IPsec can be used for site to site VPNs and also for remote access VPNs. One thing to note is that IPsec operates at the network layer of the OSI model, and it can be used to secure different protocols, and you can combine them with other protocols like GRE, like the Generic Routing Encapsulation, protocol to encrypt different types of multicast packets that are used for routing protocols like OSPF and many others. Now, IPsec provides two modes of operations: transport mode and tunnel mode. In transport mode, only the payload, so basically the data that is being transmitted is encrypted while the header and the…

Contents