Organization

   

This book is split into three parts: overview, detailed analysis, and implementation and deployment issues.

Part One is composed of the first three chapters. Chapter 1 discusses the basic cryptographic building blocks upon which IPSec is built. Symmetric and public-key cryptography and their use for both encryption and authentication are explained. Chapter 2 discusses the basics of TCP/IP and the advantages and disadvantages of implementing security at various layers in the TCP/IP protocol stack. Chapter 3 is an overview of IPSec. The IPSec architecture is discussed and each of the protocols AH, ESP, and IKE and their interrelationship is touched upon.

Part Two consists of Chapters 4 through 7. Chapter 4 is a detailed discussion of the IPSec architecture. The basic concepts of IPSec, the different modes, selectors, Security Associations, and security policy, are discussed. Chapters 5 and 6 discuss in detail the two protocols used to protect IP, the Encapsulating Security Payload and the Authentication Header, respectively. Construction and placement of protocol headers are discussed as are input and output processing rules. Chapter 7 is an in-depth discussion of the Internet Key Exchange. The different phases of negotiation, the different exchanges, the various authentication methods, and all the negotiable options are explained.

Part Three is made up of Chapters 8 through 12. Chapter 8 is a discussion of policy and its implication on IPSec. An architecture to support IPSec policy and a policy module is presented. Chapter 9 presents the issues surrounding the implementation of IPSec in a TCP/IP stack, in a platform-independent manner. Chapter 10 discusses different IPSec deployments: end-to-end security, VPNs, and the "road warrior" situation. Chapter 11 discusses how IPSec is deployed to protect a network. Chapter 12 discusses future work items for the IPSec community. These include integrating network layer compression with IPSec, extending IPSec to multicast traffic, issues associated with key recovery, IPSec interaction with the Layer Two Tunneling Protocol (L2TP), and public-key infrastructures.


   
Top


IPSec(c) The New Security Standard for the Internet, Intranets, and Virtual Private Networks
IPSec (2nd Edition)
ISBN: 013046189X
EAN: 2147483647
Year: 2004
Pages: 76

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net