IPSec and MPLS, (Even Better Together)

ثبت نشده
چکیده

........................................................................................................................................... 1 IP SECURITY (IPSEC).......................................................................................................................... 1 MULTI-PROTOCOL LABEL SWITCHING (MPLS) ......................................................................... 4 IPSEC AND MPLS................................................................................................................................. 7 SUMMARY ............................................................................................................................................ 9 TERMINOLOGY................................................................................................................................. 10 REFERENCES ..................................................................................................................................... 11

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Privacy issues in virtual private networks

The term “private” in virtual private network is sometimes taken for granted, and people can be too distracted by the “virtual” and “network” to really consider what is meant by “private.” In this paper, we consider the issues and meanings of the term private, and look at these issues with respect to two of the dominant VPN technologies, IPsec and MPLS.

متن کامل

An IPSec Mediation Approach for Safe Establishment of Inter-domain VPNs

In this paper we propose a new solution to increase the security of BGP/MPLS IP VPNs established across multiple domains. In general, layer 3 VPNs already present a number of security risks when used in single domain scenarios, since they are vulnerable to attacks originated inside the provider backbone. In order to overcome these risks, IPSec tunnels are recommended. In multi-domain scenarios,...

متن کامل

Use of IPsec Transport Mode for Dynamic Routing

IPsec can secure the links of a multihop network to protect communication between trusted components, e.g., for a secure virtual network (VN), overlay, or virtual private network (VPN). Virtual links established by IPsec tunnel mode can conflict with routing and forwarding inside VNs because IP routing depends on references to interfaces and next-hop IP addresses. The IPsec tunnel mode specific...

متن کامل

Cryptography in Theory and Practice: The Case of Encryption in IPsec

Abstract. Despite well-known results in theoretical cryptography highlighting the vulnerabilities of unauthenticated encryption, the IPsec standards mandate its support. We present evidence that such “encryptiononly” configurations are in fact still often selected by users of IPsec in practice, even with strong warnings advising against this in the IPsec standards. We then describe a variety of...

متن کامل

A Cryptographic Evaluation of IPsec

In February 1999, we performed an evaluation of IPsec based on the November 1998 RFCs for IPsec [KA98c, KA98a, MG98a, MG98b, MD98, KA98b, Pip98, MSST98, HC98, GK98, TDG98, PA98]. Our evaluation focused primarily on the cryptographic properties of IPsec. We concentrated less on the integration aspects of IPsec, as neither of us is intimately familiar with typical IP implementations, IPsec was a ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003