ConfigurationofaSite-to-SiteIPsecVirtualPrivateNetworkA.pptVIP

  • 1
  • 0
  • 约8.01千字
  • 约 39页
  • 2016-09-26 发布于天津
  • 举报

ConfigurationofaSite-to-SiteIPsecVirtualPrivateNetworkA.ppt

ConfigurationofaSite-to-SiteIPsecVirtualPrivateNetworkA.ppt

Configuration of a Site-to-Site IPsec Virtual Private Network Anuradha Kallury CS 580 Special Project August 23, 2005 IPsec – An Introduction IPsec is a suite of protocols used to create virtual private networks (VPNs) Creates encrypted tunnel between 2 private networks Authenticates both ends of the tunnel IPsec – An Introduction (Cont’d) Can choose what traffic to encrypt and how to encrypt it Encapsulates and encrypts IP data only (can use GRE for non-IP traffic) IPsec is composed of the following main protocols: Internet Key Exchange (IKE) protocol Encapsulating Security Payload (E

文档评论(0)

1亿VIP精品文档

相关文档