DocumentCode
3636468
Title
Interoperability issues among various IPsec implementations
Author
Cristina Vintilă
Author_Institution
Military Technical Academy, Bucharest, Romania
fYear
2010
Firstpage
411
Lastpage
414
Abstract
Most of the major providers of networking hardware and software came up with solutions for VPN connections. Companies use VPN connections in order to secure communications between branches or for remote workers. One of the most encountered ways of securing communications is to use IPsec VPN. This protocol uses cryptography in order to encrypt and authenticate the traffic flowing between points of interest. Actually, this is a large set of related protocols operating above the IP layer of the OSI stack, each represented by an RFC specification. It is very important that each vendor implements these specifications exactly, in order to be able to interoperate with other vendors and the IPsec access configuration is the one posing the most issues. This is because vendors have the liberty of implementing the access requirements as they consider, having to follow guidelines that are not restrictive. The paper summarizes the interoperability issues that appear when configuring IPsec on different vendor devices and draws a few conclusions on the level of interoperability, protocol compliance and best practices to adopt when deciding which solution a customer needs for his/her business.
Keywords
"Virtual private networks","Cryptography","Cryptographic protocols","Authentication","Security","Phase shift keying","Internet","Access protocols","Protection","Portable computers"
Publisher
ieee
Conference_Titel
Communications (COMM), 2010 8th International Conference on
Print_ISBN
978-1-4244-6360-2
Type
conf
DOI
10.1109/ICCOMM.2010.5509093
Filename
5509093
Link To Document