1 ipsec: concept for secure ip connections, Policies, The target of ipsec – Nortel Networks 608(WL) User Manual
Page 13: In this section, Ipsec: concept for secure ip connections, Chapter 1
Chapter 1
IPSec: Concept for secure IP connections
E-DOC-CTC-20051017-0169 v1.0
11
1 IPSec: Concept for secure IP connections
Policies
The introduction of network security mainly involves the application of traffic
policies. Firstly, the policies need to be defined, then it should be whether the
policies are correctly applied.
Security policies can apply to various levels. The IPSec protocol (Internet Protocol
Security) applies to the IP layer. This location of the IPSec protocol within the
layered network model makes it a generic solution for a wide range of applications.
Types of policies supported in the IPSec protocol:
user/entity authentication
level of encryption
validity time of the keys
...
The Target of IPSec
The main goals for using the IPSec protocol suite are:
Integrity of data
It ensures that data has not been modified in transit.
Confidentiality of data
On non-trusted network sections, the data is encrypted. When this data is
intercepted, it cannot be interpreted by the eavesdropper.
User authentication
Ensures that you know the party you are communicating with, and that they
are who they say they are.
In this section
The following items are discussed in this section:
Topic
Page