CHAPTER 29 IP Security
What You Will Learn
In this chapter, you will learn how IPSec adds another level of security to a TCP/IP network by adding IPSec to the MPLS-based VPN that we built in Chapter 26. We’ll investigate the IPSec architecture and how its features are usually implemented.
You will learn about security associations and how authentication and encapsulation work in IPSec. We’ll briefly mention the Internet key exchange (IKE) as a secure way to move keys around the network.
IPSec, as has been pointed out, is really a piece of IPv6 that was pressed into service for IPv4, mostly out of desperation after businesses began to use the Internet for more than just amusement. The formats for IPv4 and IPv6 IPSec are different, given the ...