DocumentCode :
3636468
Title :
Interoperability issues among various IPsec implementations
Author :
Cristina Vintilă
Author_Institution :
Military Technical Academy, Bucharest, Romania
fYear :
2010
Firstpage :
411
Lastpage :
414
Abstract :
Most of the major providers of networking hardware and software came up with solutions for VPN connections. Companies use VPN connections in order to secure communications between branches or for remote workers. One of the most encountered ways of securing communications is to use IPsec VPN. This protocol uses cryptography in order to encrypt and authenticate the traffic flowing between points of interest. Actually, this is a large set of related protocols operating above the IP layer of the OSI stack, each represented by an RFC specification. It is very important that each vendor implements these specifications exactly, in order to be able to interoperate with other vendors and the IPsec access configuration is the one posing the most issues. This is because vendors have the liberty of implementing the access requirements as they consider, having to follow guidelines that are not restrictive. The paper summarizes the interoperability issues that appear when configuring IPsec on different vendor devices and draws a few conclusions on the level of interoperability, protocol compliance and best practices to adopt when deciding which solution a customer needs for his/her business.
Keywords :
"Virtual private networks","Cryptography","Cryptographic protocols","Authentication","Security","Phase shift keying","Internet","Access protocols","Protection","Portable computers"
Publisher :
ieee
Conference_Titel :
Communications (COMM), 2010 8th International Conference on
Print_ISBN :
978-1-4244-6360-2
Type :
conf
DOI :
10.1109/ICCOMM.2010.5509093
Filename :
5509093
Link To Document :
بازگشت