Overview and Objectives

This chapter covers the basic topics of the IPSec protocol. IPSec is not a protocol per se, but rather a suite of protocols used to secure data as it traverses an untrusted network. For example, if we want to get confidential data from Los Angeles to New York, we can send the data via email, but email crosses the network in plaintext, which means anyone listening on the wire can obtain our confidential data. What we need to do is garble the data right before we send it and have some way to reconstruct the data on the opposite end. That is the basis of encryption. Encryption garbles the data to create ciphertext, which is what we call the meaningless data after it has been encrypted. The peer at the other end decrypts the ...

Get SECUR Exam Cram™ 2 (Exam 642-501) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.