Results 1 to 6 of 6

Thread: How to implement IP Sec

  1. #1
    Join Date
    Nov 2009
    Posts
    865

    How to implement IP Sec

    Hi,
    IPsec is an security service which provide an nice IP based network option. Basically it is a network layer protocol. It encrypts the data so that no one can sniffed the data from network and so the data cannot be hacked. It is great functionality. I need some tips and suggestions on implementing this technology. How to do that and what things must be considered for this.

  2. #2
    Join Date
    May 2008
    Posts
    2,792

    Re: How to implement IP Sec

    This technology aims to establish a secure connection (tunnel) between remote entities, separated by an insecure network like the Internet public to see, and do so almost transparent if desired. In article below, this mode is IPSec tunneling mode, which will be described first. In this there properties of tunnels in VPNs is data is encrypted in transit (confidentiality) and protected (integrity), the 2 ends are authenticated, the source and destination addresses are encrypted with IPSec (IP IPSec) and they may show following the protocol of anti-quality replays or prevent attacks man-in-the-middle.

  3. #3
    Join Date
    Apr 2008
    Posts
    2,572

    Re: How to implement IP Sec

    Do not neglect the practical aspects such as CPU load due to encryption, the theoretical speed possible, the overhead induced and therefore the actual throughput ... Moreover IPsec is not the only protocol for establishing tunnels, there are others such as point-to-point "as L2TP, L2F, or PPTP, which can induce significant overhead especially when d 'successive encapsulations (L2TPoATM with AAL5, L2TPoEthernet, L2TPoUDP, etc).

  4. #4
    Join Date
    Oct 2005
    Posts
    2,358

    Re: How to implement IP Sec

    If we see piratically it is a protocol which is difficult to implement and share. This is why because it is complex. The reason for its complexity is its interaction with the other different network process. The same is created by keeping the compatibility in the mind. It has a 3 layer protocol which cannot be modified or changed. It remains constant.

  5. #5
    Join Date
    May 2008
    Posts
    2,134

    Re: How to implement IP Sec

    We cannot say there are multiple issue with the protocol and its working with the NAT. In other words it integration with the kernel (host). In this they are 3 variants with changing IP. So here the kernel itself stays the most complicated one. This applies to all. Here he BITS returns for separation of IPSec processings.

  6. #6
    Join Date
    Apr 2008
    Posts
    2,277

    Re: How to implement IP Sec

    The services return to the IPSec protocol. But this is regardless of the encrypted tunneling process in IPSec. If we go for what are the different security options given by it then you have to ensure the different properties of a VAP first. So the IPSec at level 3 gives out a authentication level which is equal to the authentication engine. This authentication engine implements the protocol.

Similar Threads

  1. How to implement sum() faster in c#?
    By Luis-Fernando in forum Software Development
    Replies: 4
    Last Post: 27-02-2010, 09:25 PM
  2. How can I implement the remove() in CPP
    By Servant in forum Software Development
    Replies: 5
    Last Post: 22-02-2010, 04:18 PM
  3. Implement the copy_backward() in C++
    By Agustíne in forum Software Development
    Replies: 5
    Last Post: 16-02-2010, 09:46 PM
  4. Implement the equal_range() in C++
    By Garrick in forum Software Development
    Replies: 5
    Last Post: 15-02-2010, 07:09 PM
  5. Want to implement differentiation in C++
    By ADEN in forum Software Development
    Replies: 1
    Last Post: 25-10-2008, 06:13 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,713,559,587.48046 seconds with 17 queries