Amazon cover image
Image from Amazon.com

Demystifying the IPsec puzzle / Sheila Frankel.

By: Material type: TextTextSeries: Artech House computer security seriesPublication details: Boston, MA : Artech House, 2001.Description: 1 online resource (273 pages) : illustrationsContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 158053399X
  • 9781580533997
Subject(s): Additional physical formats: Print version:: Demystifying the IPsec puzzle.DDC classification:
  • 004.6/2 21
LOC classification:
  • TK5105.567 .F73 2001eb
Online resources:
Contents:
Contents vii -- Preface xvii -- 1 Introduction 1 -- 1.1 The TCP/IP Protocol Stack 5 -- 1.2 Introducing IPsec 12 -- 1.3 Summary 13 -- 1.4 Further Reading 14 -- References 14 -- 2 The First Puzzle Piece: The Authentication Header 15 -- 2.1 Protections Provided by AH 15 -- 2.2 Security Associations and the Security Parameters Index 16 -- 2.3 AH Format 19 -- 2.4 AH Location 20 -- 2.5 AH Modes 21 -- 2.6 Nested Headers 22 -- 2.7 Implementing IPsec Header Processing 23 -- 2.8 AH Processing for Outbound Messages 25
2.9 AH Processing for Inbound Messages 302.10 Complications 32 -- 2.11 Auditing 35 -- 2.12 Threat Mitigation 37 -- 2.13 Summary 37 -- 2.14 Further Reading 38 -- References 38 -- 3 The Second Puzzle Piece: The Encapsulating Security Payload 41 -- 3.1 Protections Provided by ESP 41 -- 3.2 Security Associations and the Security Parameters Index 42 -- 3.3 ESP Header Format 43 -- 3.4 ESP Header Location and Modes 45 -- 3.5 Nested and Adjacent Headers 46 -- 3.6 ESP Header Processing for Outbound Messages 48
3.7 ESP Header Processing for Inbound Messages 493.8 Complications 52 -- 3.9 Criticisms and Counterclaims 52 -- 3.10 Threat Mitigation 54 -- 3.11 Why Two Security Headers? 55 -- 3.12 Summary 56 -- 3.13 Further Reading 56 -- References 57 -- 4 The Third Puzzle Piece: The Cryptographic Algorithms 59 -- 4.1 Underlying Principles 60 -- 4.2 Authentication Algorithms 62 -- 4.3 The ESP Header Encryption Algorithms 68 -- 4.4 Complications 78 -- 4.5 Public Key Cryptography 79 -- 4.6 Conclusion 82 -- 4.7 Further Reading 82
5.14 Lifetimes 1015.15 Vendor IDs 101 -- 5.16 The Phase 1 Negotiation 101 -- 5.17 The Phase 2 Negotiation 112 -- 5.18 New Group Mode 117 -- 5.19 Informational Exchanges 118 -- 5.20 The ISAKMP Header 119 -- 5.21 The Generic Payload Header 120 -- 5.22 The IKE State Machine 121 -- 5.23 The Origins of IKE 122 -- 5.24 An Example 122 -- 5.25 Criticisms and Counterclaims 123 -- 5.26 Threat Mitigation 125 -- 5.27 Summary 125 -- 5.28 Further Reading 126 -- References 127 -- 6 The Fifth Puzzle Piece: IKE and the Road Warrior 129
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library EBSCO Computers Available
Total holds: 0

Includes bibliographical references and index.

Print version record.

Contents vii -- Preface xvii -- 1 Introduction 1 -- 1.1 The TCP/IP Protocol Stack 5 -- 1.2 Introducing IPsec 12 -- 1.3 Summary 13 -- 1.4 Further Reading 14 -- References 14 -- 2 The First Puzzle Piece: The Authentication Header 15 -- 2.1 Protections Provided by AH 15 -- 2.2 Security Associations and the Security Parameters Index 16 -- 2.3 AH Format 19 -- 2.4 AH Location 20 -- 2.5 AH Modes 21 -- 2.6 Nested Headers 22 -- 2.7 Implementing IPsec Header Processing 23 -- 2.8 AH Processing for Outbound Messages 25

2.9 AH Processing for Inbound Messages 302.10 Complications 32 -- 2.11 Auditing 35 -- 2.12 Threat Mitigation 37 -- 2.13 Summary 37 -- 2.14 Further Reading 38 -- References 38 -- 3 The Second Puzzle Piece: The Encapsulating Security Payload 41 -- 3.1 Protections Provided by ESP 41 -- 3.2 Security Associations and the Security Parameters Index 42 -- 3.3 ESP Header Format 43 -- 3.4 ESP Header Location and Modes 45 -- 3.5 Nested and Adjacent Headers 46 -- 3.6 ESP Header Processing for Outbound Messages 48

3.7 ESP Header Processing for Inbound Messages 493.8 Complications 52 -- 3.9 Criticisms and Counterclaims 52 -- 3.10 Threat Mitigation 54 -- 3.11 Why Two Security Headers? 55 -- 3.12 Summary 56 -- 3.13 Further Reading 56 -- References 57 -- 4 The Third Puzzle Piece: The Cryptographic Algorithms 59 -- 4.1 Underlying Principles 60 -- 4.2 Authentication Algorithms 62 -- 4.3 The ESP Header Encryption Algorithms 68 -- 4.4 Complications 78 -- 4.5 Public Key Cryptography 79 -- 4.6 Conclusion 82 -- 4.7 Further Reading 82

5.14 Lifetimes 1015.15 Vendor IDs 101 -- 5.16 The Phase 1 Negotiation 101 -- 5.17 The Phase 2 Negotiation 112 -- 5.18 New Group Mode 117 -- 5.19 Informational Exchanges 118 -- 5.20 The ISAKMP Header 119 -- 5.21 The Generic Payload Header 120 -- 5.22 The IKE State Machine 121 -- 5.23 The Origins of IKE 122 -- 5.24 An Example 122 -- 5.25 Criticisms and Counterclaims 123 -- 5.26 Threat Mitigation 125 -- 5.27 Summary 125 -- 5.28 Further Reading 126 -- References 127 -- 6 The Fifth Puzzle Piece: IKE and the Road Warrior 129

English.

Added to collection customer.56279.3

Powered by Koha