Results 1 to 6 of 6

Thread: How ipsec initiate protection against eavesdropping

  1. #1
    Join Date
    Nov 2009
    Posts
    46

    How ipsec initiate protection against eavesdropping

    What is the role of ipsec in protection against eavesdropping and traffic analysis. I need a detailed description on this. Like wise ipsec can be a medium of data packets traveling but does this method relies really secure on wide networks were data are freely exchanged. I had found only ipsec as an essential protocol but want to familiar more on the working process.

  2. #2
    Join Date
    Apr 2008
    Posts
    3,424

    Re: How ipsec intiate protection against eavesdropping

    Confidentiality of data exchanged, IPSec can if you want to encrypt the contents of each IP packet to make sure or guarantee that anyone can read. Authenticity of Data in this the IPSec make sure or guarantee, for each packet exchanged, it has been issued by the good machine and it is destined for the second machine. Integrity of data exchanged in this the IPSec make sure or guarantee no packet undergoes any change (called active attacks) during his trip.

  3. #3
    Join Date
    May 2008
    Posts
    3,516

    Re: How ipsec intiate protection against eavesdropping

    IPSec will encrypt the actual IP addresses of the foundation and purpose or objective, and the entire IP header match. This is the method of tunneling, which protects any attacker to listen to infer information in sequence about the real identities of the end of the tunnel on the protocols used over IPsec, on the submission using the tunnel (timing -attacks and other).

  4. #4
    Join Date
    Apr 2008
    Posts
    3,339

    Re: How ipsec intiate protection against eavesdropping

    Protection against replay in this the IPSec can prevent themselves against the damages of capturing one or more packages in order to send them again (without having deciphered) to enjoy the same advantages as the original sender. IPSec is essentially based on several different protocols, some are wholly outside of its IPSec-back offer great elasticity.

  5. #5
    Join Date
    Jan 2006
    Posts
    4,221

    Re: How ipsec intiate protection against eavesdropping

    Ipsec initiate protection against eavesdropping for this the initial and primary protocol is IKE (Internet Key Exchange, RFC 2409). Applied to IPSec, the protocol aims at first to establish a first tunnel between 2 machines (the tunnel IKE), which can be termed "administrative tunnel. This is Phase 1 of IKE. This protocol is called administrative because it is not the transmission of user data and is used to manage secondary tunnels, their creation, refresh keys, etc.
    Last edited by Zachary; 08-02-2010 at 12:11 PM.

  6. #6
    Join Date
    Jan 2006
    Posts
    3,792

    Re: How ipsec initiate protection against eavesdropping

    Phase 2 of IKE is indeed to establish as many side tunnels as necessary for the transmission of user data between 2 machines. Note that it is possible to use a manual authentication instead of IKE, but as it allows a lot more than authentication, it is much harder to use. The IKE protocol is described in the section on initialization of IPSec.

Similar Threads

  1. how does trim initiate ssd performance
    By Bartolomeo in forum Hardware Peripherals
    Replies: 4
    Last Post: 21-06-2011, 08:35 AM
  2. Firefox 4 cannot initiate on Ubuntu 64bit
    By Techie-JI in forum Technology & Internet
    Replies: 3
    Last Post: 25-03-2011, 08:15 AM
  3. Different ways to initiate an object
    By Angelica Maria in forum Software Development
    Replies: 5
    Last Post: 11-03-2010, 12:46 PM
  4. How to Initiate/Enable Dictation in Vista
    By GUSSIE in forum Operating Systems
    Replies: 3
    Last Post: 10-07-2009, 03:05 PM
  5. Eavesdropping on WiFi network
    By Rixwel in forum India BroadBand
    Replies: 2
    Last Post: 30-09-2008, 04:26 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,713,508,280.36542 seconds with 17 queries