How to hide ip: VPN Protocols – IPSec


How to hide ip: VPN Protocols – IPSec

VPN Protocols – IPSec

Posted: 24 Aug 2011 01:09 AM PDT

I agree that reading too much about VPN Protocols might be boring at times but sometimes you got to plunge into the boring details of a technology in order to understand that technology better. I promise to stay away from such boring topics once I am done with this series on VPN Protocols, but for now please bear with me. I am trying to fill up the archives of How to Hide IP with some really good information.

Till now, we have covered the below VPN Protocols (the list is being updated as and when new content is written):

When I say IPSec then I guess the Windows based users should feel an adrenaline rush. After all, IPSec is their protocol which is used in partnership with the likes of Layer 2 Tunneling Protocol. IPSec can be used as a funneling protocol on its own. It has been tagged by many critics as the standard VPN solution due to its balanced nature and list of amazing features. One such important feature that helps IPSec achieve the status of standard VPN solution is its improved connectivity in case of gateway-to-fateway VPNs. IPSec operates at higher position in our network OSI model which we call as network layer (whose commercial name is Layer 3.)

IPSec is also famous for its implementation by most of the hardware VPN machines. To take an example, Cisco’s VPN Concentrators and the PIX firewalls use IPsec. Others using IPSec are SonicWall, NetScreen, and WatchGuard machines. Some of the enterprise level software firewalls that support IPSec are CheckPoint, ISA Server, and Symantic Enterprise Firewall. Please understand that this was just a list of hardware and software that support IPSec. You will find a lot more once you start Googling.

While in tunnel mode, IPSec smartly secures packets that are being moved from one gateway to other or from a client computer to a gateway. IPSec works with IP based applications and networks. Wasn’t that pretty obvious due to its name? Just like L2TP and PPTP, even IPSec looks for a client installed in the local machine for it to work properly.

When it comes to authentication, IPSec uses Internet Key Exchange (IKE) protocol with digital certificates (the more secure method) accompanied. In some cases, preshared key is used in place of digital certificates. Due to these features, IPSec is smart enough to protect VPN services from famous hack attacks like – man-in-the-middle attack, Replay, and Denial-of-Service (DoS) attack.

IPSec is supported by Windows XP/2000/2003 only. The older version of Windows Operating System do not support IPSec. Third party VPN vendors, like Cisco and CheckPoint, will provide client based custom software when they offer VPN services. Please understand that these might cost you some money.

Post from: How to hide ip

VPN Protocols – IPSec

Related Posts:

  1. VPN Protocols – Layer 2 Tunneling Protocol
  2. VPN Protocols – Point-to-Point Tunneling Protocol
  3. How to Set Up an IPSec VPN Connection


Post a Comment

Note: Only a member of this blog may post a comment.


©2009 Programming & Security | Template Blue by TNB

Vida de bombeiro Recipes Informatica Humor Jokes Mensagens Curiosity Saude Video Games Diario das Mensagens Eletronica Rei Jesus News Noticias da TV Artesanato Esportes Noticias Atuais Games Pets Career Religion Recreation Business Education Autos Academics Style Television Programming Motosport Humor News The Games Home Downs World News Internet Design Entertaimment Celebrities 1001 Games Doctor Pets Net Downs World Enter Jesus Mensagensr Android Rub Letras Dialogue cosmetics Genexus Só Humor Curiosity Gifs Medical Female American Health Madeira Designer PPS Divertidas Estate Travel Estate Writing Computer Matilde Ocultos futebolcomnoticias girassol lettheworldturn topdigitalnet Bem amado enjohnny produceideas foodasticos cronicasdoimaginario downloadsdegraca compactandoletras newcuriosidades blogdoarmario arrozinhoii sonasol halfbakedtaters make-it-plain amatha lisboaohyeah lasofia thebushrajr wingshock tripedes gorduravegetal dainfamia dejavu-transpersonal jsbenfica republicadasbadanas ruiherbon iranianforaryans eaystcheyl fotosdanadir ojosmasabiertos ceilasantos