Please Whitelist This Site?

I know everyone hates ads. But please understand that I am providing premium content for free that takes hundreds of hours of time to research and write. I don't want to go to a pay-only model like some sites, but when more and more people block ads, I end up working for free. And I have a family to support, just like you. :)

If you like The TCP/IP Guide, please consider the download version. It's priced very economically and you can read all of it in a convenient format without ads.

If you want to use this site for free, I'd be grateful if you could add the site to the whitelist for Adblock. To do so, just open the Adblock menu and select "Disable on tcpipguide.com". Or go to the Tools menu and select "Adblock Plus Preferences...". Then click "Add Filter..." at the bottom, and add this string: "@@||tcpipguide.com^$document". Then just click OK.

Thanks for your understanding!

Sincerely, Charles Kozierok
Author and Publisher, The TCP/IP Guide


NOTE: Using software to mass-download the site degrades the server and is prohibited.
If you want to read The TCP/IP Guide offline, please consider licensing it. Thank you.

The Book is Here... and Now On Sale!

Read offline with no ads or diagram watermarks!
The TCP/IP Guide

Custom Search







Table Of Contents  The TCP/IP Guide
 9  TCP/IP Lower-Layer (Interface, Internet and Transport) Protocols (OSI Layers 2, 3 and 4)
      9  TCP/IP Internet Layer (OSI Network Layer) Protocols
           9  Internet Protocol (IP/IPv4, IPng/IPv6) and IP-Related Protocols (IP NAT, IPSec, Mobile IP)
                9  IP Security (IPSec) Protocols

Previous Topic/Section
IP Security (IPSec) Protocols
Previous Page
Pages in Current Topic/Section
12
3
Next Page
IPSec General Operation, Components and Protocols
Next Topic/Section

IPSec Overview, History and Standards
(Page 3 of 3)

IPSec Standards

Since IPSec is actually a collection of techniques and protocols, it is not defined in a single Internet standard. Instead, a collection of RFCs defines the architecture, services and specific protocols used in IPSec. Some of the most important of these are shown in Table 78, all of which were published in November 1998:


Table 78: Important IP Security (IPSec) Standards

RFC Number

Name

Description

2401

Security Architecture for the Internet Protocol

The main IPSec document, describing the architecture and general operation of the technology, and showing how the different components fit together.

2402

IP Authentication Header

Defines the IPSec Authentication Header (AH) protocol used for ensuring data integrity and origin verification.

2403

The Use of HMAC-MD5-96 within ESP and AH

Describes a particular encryption algorithm for use by AH and ESP called Message Digest 5 (MD5), HMAC variant. (Obviously. J)

2404

The Use of HMAC-SHA-1-96 within ESP and AH

Describes a particular encryption algorithm for use by AH and ESP called Secure Hash Algorithm 1 (SHA-1), HMAC variant. (Naturally. J)

2406

IP Encapsulating Security Payload (ESP)

Describes the IPSec Encapsulation Security Payload (ESP) protocol that provides data encryption for confidentiality.

2408

Internet Security Association and Key Management Protocol (ISAKMP)

Defines methods for exchanging keys and negotiating security associations.

2409

The Internet Key Exchange (IKE)

Describes the Internet Key Exchange (IKE) protocol used to negotiate security associations and exchange keys between devices for secure communications. Based on ISAKMP and OAKLEY.

2412

The OAKLEY Key Determination Protocol

Describes a generic protocol for key exchange.


The Future of IPSec

Deployment of IPSec has only really started to take off in the last few years; a major use of the technology is in implementing virtual private networks (VPNs). It appears that the future IPSec is bright, as more and more individuals and companies decide that they need to take advantage of the power of the Internet, while also protecting the security of the data they transport over it.


Previous Topic/Section
IP Security (IPSec) Protocols
Previous Page
Pages in Current Topic/Section
12
3
Next Page
IPSec General Operation, Components and Protocols
Next Topic/Section

If you find The TCP/IP Guide useful, please consider making a small Paypal donation to help the site, using one of the buttons below. You can also donate a custom amount using the far right button (not less than $1 please, or PayPal gets most/all of your money!) In lieu of a larger donation, you may wish to consider purchasing a download license of The TCP/IP Guide. Thanks for your support!
Donate $2
Donate $5
Donate $10
Donate $20
Donate $30
Donate: $



Home - Table Of Contents - Contact Us

The TCP/IP Guide (http://www.TCPIPGuide.com)
Version 3.0 - Version Date: September 20, 2005

© Copyright 2001-2005 Charles M. Kozierok. All Rights Reserved.
Not responsible for any loss resulting from the use of this site.