This chapter covers the following subjects:
IP Security with IPv6: Offers a brief overview of IPsec and how it works with IPv6
Host-to-Host IPsec: Discusses using IPsec between computers
Site-to-Site IPsec Configuration: Shows IPv6 IPsec configuration examples over IPv4 and IPv6
Remote Access with IPsec: Describes remote-access VPNs with IPsec and ISATAP
SSL VPNs: Describes AnyConnect Client using SSL VPNs in a dual-stack configuration
For humans talking on the phone, it is easy to determine who is on the other end, but for a computer, it is difficult to authenticate who it might be communicating with. Communications in unfriendly environments where eavesdropping and man-in-the-middle attacks exist require ...