{"id":558,"date":"2011-02-21T11:13:37","date_gmt":"2011-02-21T11:13:37","guid":{"rendered":"http:\/\/www.esds.co.in\/data-centers\/kb\/?p=558"},"modified":"2015-06-22T11:25:24","modified_gmt":"2015-06-22T11:25:24","slug":"ipsec-what-is-it","status":"publish","type":"post","link":"https:\/\/www.esds.co.in\/kb\/ipsec-what-is-it\/","title":{"rendered":"IPSec &#8211; what is it ?"},"content":{"rendered":"<p><!-- \t\t@page { margin: 2cm } \t\tP { margin-bottom: 0.21cm } --><img loading=\"lazy\" class=\"aligncenter size-full wp-image-560\" title=\"ipsec-and-vpn\" alt=\"\" src=\"http:\/\/www.esds.co.in\/kb\/wp-content\/uploads\/2011\/02\/ipsec-and-vpn.jpg\" width=\"675\" height=\"262\" \/><\/p>\n<p><strong>IPSec <\/strong>&#8211; is a widely used technology which allows you to add an additional level of encryption and authentication \/ message integrity to any traffic, which is transmitted over IP. It is used both to create a VPN, or just for protecting individual hosts or data.<br \/>\nipsec<br \/>\n<strong>Principally, the IPSec can be divided into three separate parts: <\/strong><\/p>\n<p><strong>1. <\/strong>A protocol for AH, which allows you to sign \/ hash IP-packets, which allows the sender to verify the authenticity and integrity of the package. It just adds a signature to a package and does not encrypt it.<\/p>\n<p><strong>2.<\/strong> Protocol ESP &#8211; Encapsulated Security Payload &#8211; allows you to encrypt all data in the package as a whole, using different algorithms.<\/p>\n<p><strong>3.<\/strong> Minutes of IKE, which can optionally be used to exchange encryption keys between the parties.<\/p>\n<p>Basically, the authentication of the parties uses RSA-certificate or shared key. With this choice, it depends on the problem. In general, RSA-certificates are a more scalable option, especially in the presence of a distributed network with multiple connections between hosts or routers, as in this case, each node is sufficient to have only a certificate of your Certificate Authority (CA) to authenticate the sender, and not a separate passphrase for each connection.<\/p>\n<p><strong>IPSec can be used in two different modes that have different applications. <\/strong><\/p>\n<p><strong>1.<\/strong> Transport mode: Just encrypt \/ sign data packets in accordance with prescribed policies. Used in the compounds of host-host.<\/p>\n<p><strong>2.<\/strong> Tunnel mode: Is used on routers to create encrypted tunnels between private networks over public networks such as the Internet. Characterized in that, the traffic from the protected network is encapsulated in the IP-packets with headers and encrypted \/ signed, then sent to another router, which it decodes and passes on.<\/p>\n<p><strong>Thus, there are different modes in which you can use IPSec:<\/strong><\/p>\n<p><strong>1. <\/strong>Host-host connection.<br \/>\n<strong>2. <\/strong>Connection host gateway.<br \/>\n<strong>3. <\/strong>Gateway connection gateway.<\/p>\n<p>In all three cases, there is a slightly different approach, especially in the mobile version of the host gateway, where the address of the mobile <strong>dedicated hosting <\/strong>is not known beforehand.<\/p>\n<p>Moreover, for some operating systems, there are several implementations of IPSec-stack, which can be configured differently (although the concept is the same everywhere).<\/p>\n<p>The main difficulty in installing IPSec-connections between different OS \/ devices is the possible incompatibility between implementations or different sets of supported protocols and authentication methods.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IPSec &#8211; is a widely used technology which allows you to add an additional level of encryption and authentication \/ message integrity to any traffic, which is transmitted over IP. It is used both to create a VPN, or just for protecting individual hosts or data. ipsec Principally, the IPSec can be divided into three&#8230; <\/p>\n<div class=\"clear\"><\/div>\n<p><a href=\"https:\/\/www.esds.co.in\/kb\/ipsec-what-is-it\/\" class=\"gdlr-button small excerpt-read-more\">Read More<\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[69],"tags":[24,223,226,225,224],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v15.9.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IPSec - what is it | What is IPSec | IPSec Defined<\/title>\n<meta name=\"description\" content=\"KB post that defines IPSec, including information about how IPSec is divided and as well as information about two different modes that have different applications that can be used with IPSec.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.esds.co.in\/kb\/ipsec-what-is-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IPSec - what is it | What is IPSec | IPSec Defined\" \/>\n<meta property=\"og:description\" content=\"KB post that defines IPSec, including information about how IPSec is divided and as well as information about two different modes that have different applications that can be used with IPSec.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.esds.co.in\/kb\/ipsec-what-is-it\/\" \/>\n<meta property=\"og:site_name\" content=\"ESDS Official Knowledgebase\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ESDSdc\/\" \/>\n<meta property=\"article:published_time\" content=\"2011-02-21T11:13:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-06-22T11:25:24+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.esds.co.in\/kb\/wp-content\/uploads\/2011\/02\/ipsec-and-vpn.jpg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ESDSDataCenter\" \/>\n<meta name=\"twitter:site\" content=\"@ESDSDataCenter\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"2 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/#website\",\"url\":\"https:\/\/www.esds.co.in\/kb\/\",\"name\":\"ESDS Official Knowledgebase\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/www.esds.co.in\/kb\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/ipsec-what-is-it\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"http:\/\/www.esds.co.in\/kb\/wp-content\/uploads\/2011\/02\/ipsec-and-vpn.jpg\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/ipsec-what-is-it\/#webpage\",\"url\":\"https:\/\/www.esds.co.in\/kb\/ipsec-what-is-it\/\",\"name\":\"IPSec - what is it | What is IPSec | IPSec Defined\",\"isPartOf\":{\"@id\":\"https:\/\/www.esds.co.in\/kb\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.esds.co.in\/kb\/ipsec-what-is-it\/#primaryimage\"},\"datePublished\":\"2011-02-21T11:13:37+00:00\",\"dateModified\":\"2015-06-22T11:25:24+00:00\",\"author\":{\"@id\":\"https:\/\/www.esds.co.in\/kb\/#\/schema\/person\/d951a1b6843822458f3c5f5ee02a74e8\"},\"description\":\"KB post that defines IPSec, including information about how IPSec is divided and as well as information about two different modes that have different applications that can be used with IPSec.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.esds.co.in\/kb\/ipsec-what-is-it\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.esds.co.in\/kb\/ipsec-what-is-it\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/ipsec-what-is-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/\",\"url\":\"https:\/\/www.esds.co.in\/kb\/\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"position\":2,\"item\":{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/ipsec-what-is-it\/\",\"url\":\"https:\/\/www.esds.co.in\/kb\/ipsec-what-is-it\/\",\"name\":\"IPSec &#8211; what is it ?\"}}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/#\/schema\/person\/d951a1b6843822458f3c5f5ee02a74e8\",\"name\":\"ESDS ADMIN\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.esds.co.in\/kb\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/5618393df3c15e5b6b3b9ef917e83827?s=96&d=mm&r=g\",\"caption\":\"ESDS ADMIN\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","_links":{"self":[{"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/posts\/558"}],"collection":[{"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/comments?post=558"}],"version-history":[{"count":11,"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/posts\/558\/revisions"}],"predecessor-version":[{"id":2829,"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/posts\/558\/revisions\/2829"}],"wp:attachment":[{"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/media?parent=558"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/categories?post=558"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.esds.co.in\/kb\/wp-json\/wp\/v2\/tags?post=558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}