IPsec_Report_Template (1)
IPsec_Report_Template (1)
Report
Total Marks: 10
IPsec Report
3. IPsec Architecture
8. Conclusion
9. References
1. Introduction to IPsec
Internet Protocol Security (IPsec) is a suite of protocols designed to ensure the security of
communications over IP networks.
It provides data integrity, authentication, and confidentiality by encrypting and
authenticating each IP packet in a data stream.
IPsec plays a crucial role in virtual private networks (VPNs) and other secure
communications systems.
3. IPsec Architecture
The IPsec architecture consists of two main protocols: Authentication Header (AH) and
Encapsulating Security Payload (ESP).
AH ensures integrity and authentication, while ESP provides encryption. These protocols
rely on Security Associations (SAs),
which are agreements on how the communication will be secured.
- Transport Mode: Encrypts only the payload of the IP packet. It is used between hosts.
- Tunnel Mode: Encrypts the entire IP packet and adds a new header. It is commonly
used for VPNs.
- Anti-replay protection
Use Cases:
8. Conclusion
IPsec is a foundational technology for securing IP networks. It ensures that data remains
private and unaltered during transmission.
Its versatility in both host-to-host and site-to-site configurations makes it invaluable in
modern cybersecurity infrastructure.
9. References
1. RFC 4301 - Security Architecture for the Internet Protocol
5. https://www.cloudflare.com/learning/ddos/glossary/ipsec-vpn/