IPSec is a protocol suite that enables security between systems, and by security, I mean some of the three fundamental cornerstones of information security discussed in the first chapter: confidentiality and integrity, in addition to authentication and anti-replay protection. IPSec uses the following two protocols:
- Authentication Header (AH) protocol: This protocol is used to authenticate the traffic and not encrypt it. The authentication is performed, using hash functions (MD5 or SHA1).
- Encapsulating Security Payload (ESP) protocol: This protocol is also used for authentication, but it supports encryption as well.
IPSec operates in the following two different modes:
- Tunnel mode: In this mode, the entire packet is encapsulated and ...