Chapter 33 – IP Security
暂无分享,去创建一个
In this chapter, you will learn how IPSec adds another level of security to a TCP/IP network by adding IPSec to the MPLS-based VPN that we built in Chapter 26. We’ll investigate the IPSec architecture and how its features are usually implemented.
You will learn about security associations and how authentication and encapsulation work in IPSec. We’ll briefly mention the Internet key exchange (IKE) as a secure way to move keys around the network.