Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Part IV. Using VPNs for Secure Connectiv... > Chapter 20. Implementing IPsec Site-...

Chapter 20. Implementing IPsec Site-to-Site VPNs

In the previous chapters, you learned about the benefits of virtual private networks (VPN) and the protocols and methods used to implement those benefits, such as encryption for confidentiality, hashing for data integrity, and authentication for peer verification. You have also seen examples of these protocols, such as Triple Digital Encryption Standard (3DES) and Advanced Encryption Standard (AES) for encryption, message digest 5 algorithm (MD5) and Secure Hash (SHA) for data integrity, and pre-shared keys (PSK) or RSA signatures (also known as digital signatures) used for authentication.


  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint