O'Reilly logo

VPNs Illustrated: Tunnels, VPNs, and IPsec by Jon C. Snader

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

10. IPsec Architecture

10.1 Introduction

In this chapter, we look at the architecture that comprises and unifies the various IPsec protocols. We’ll see that IPsec exactly meets our definition for a VPN: It’s encryption and authentication applied to a tunnel in order to create the illusion of a private leased-line network. The overall architecture of IPsec is described in RFC 2401 [Kent and Atkinson 1998c], but separate RFCs describe its protocols and its encryption and authentication algorithms. Many of these RFCs are discussed in subsequent chapters.

RFC 2401 doesn’t talk very much about VPNs, preferring instead to discuss such objects as “secured connections.” When it does use the term VPN, the RFC applies it to the case of a secured ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required