Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a communication session. IPsec also includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session.
Questions tagged [ipsec]
213 questions
68
votes
8 answers
What is the difference in security between a VPN- and a SSL-connection?
I would like to design a client-server application where the server is placed on Internet. I assume that I could set up the client-server connection using VPN (is it using IPSec?) or using a SSL connection (possibly https). What are the differences…
Jonas
- 5,063
- 7
- 32
- 35
35
votes
6 answers
Are there any reasons for using SSL over IPSec?
is it recommended to use both protocols together? In which situation?
mcfan
- 643
- 2
- 6
- 7
24
votes
4 answers
IPsec (Internet Protocol Security) facts
Internet Protocol Security (IPsec) is a successor of the ISO standard Network Layer Security Protocol (NLSP). What are the advantages, disadvantages, other interesting facts regarding the protocol?
Eric Warriner
- 3,251
- 3
- 24
- 20
24
votes
1 answer
How credible are the rumors that the NSA has compromised IPSec?
Part of the Snowden revelations was that the NSA had targeted IPSec.
But I'm having trouble separating FUD from legitimate issues.
How credible is this? Are there ways to use IPSec to be confident against it being broken?
I like IPSec because it's…
Paul Draper
- 958
- 8
- 18
21
votes
3 answers
What is the difference between SSH and IPsec?
There seems to be similar encryption going into both. They both use asymmetric (RSA, elliptic curves, etc) for the initial key exchange, then go to some symmetric (AES, Blowfish, etc) protocol. I'm wondering if someone here might have a moment to…
stackuser
- 421
- 1
- 3
- 7
18
votes
2 answers
Which is better for server-to-server-communication: IPSec or TLS?
Maybe you could help me with a small problem.
Would you recommend IPSec or TLS for a Server-to-Server-Connection? I need two or three arguments for reasoning a decision within my final paper, but sadly didn't find a criterion for an exclusion. The…
Saturas
- 183
- 1
- 1
- 5
15
votes
1 answer
What's are the advantages of L2TP/IPSEC over plain IPSEC?
As the title says, my firewall (Sonicwall) can do either IPSEC or L2TP/IPSEC for VPN connections. One advantage of L2TP/IPSEC I can see is that the client computer get allocated its own IP address on the LAN.
Are there any other advantages?
Simon Hodgson
- 407
- 5
- 8
15
votes
5 answers
What is the potential impact of the alleged OpenBSD IPSEC attack?
Recently there is a bit of concern over encryption back doors in IPsec and while the status of this has not been confirmed, I don't know what impact something like this might have.
For instance, does this mean that, since encryption on this layer…
Incognito
- 5,204
- 5
- 27
- 31
15
votes
1 answer
If an attacker is intercepting all of my traffic, will he be able to listen on my VPN session?
If I am a remote user, connecting to my firm from home, using IPSec VPN tunnel or through SSL, and an attacker is intercepting all of my traffic, will he be able to watch my VPN session on the clear (he is there before the IKE phases and all of the…
Franko
- 1,530
- 5
- 18
- 30
13
votes
5 answers
Does IPSec use IKE or ISAKMP?
Does the IPSec protocol suite use IKE or ISAKMP?
RFC 2828 states ISAKMP is the protocol used in IPSec to handle SAs, key management and system authentication. Other sources say IKE is the protocol that used.
From RFC 2828:
$ Internet Security…
sybind
- 511
- 2
- 5
- 9
12
votes
3 answers
When do I use IPsec tunnel mode or transport mode?
I basically understand how tunnel mode and transport mode works, but I don't know when I should use one instead of another.
Among the two parties who want to communicate, if one computer B doesn't understand IPsec, I think they have to use tunnel…
Gqqnbig
- 307
- 1
- 2
- 8
12
votes
2 answers
which diffie-hellman group is needed for secure ike/ipsec
We're deploying ipsec on embedded devices and getting catastrophic performance from the diffie hellman 2048 group in ike.. afterwards the shared securet is used for 3des, sha1. ipsec negiation is well over 20s for a single tunnel.. the network…
dancl
- 223
- 1
- 2
- 6
11
votes
2 answers
Ipsec Native VPN on Windows 8 or 10
I have a Cisco PIX, and have been using the Cisco VPN client on windows however I would like to enable this to work with the native Windows 8/10 VPN client. It works fine with the native clients for Android (using IPsec Xauth PSK) and iOS (IPsec).…
user2641043
- 251
- 1
- 2
- 5
11
votes
1 answer
How secure is L2TP+IPSEC?
I understand PPTP is widely used still, but insecure. A convenient alternative is: L2TP+IPSEC.
How secure is it?
What steps in the server setup can I take to maintain a high degree of compatibility with Windows 7+ and OSX clients and still maintain…
hookenz
- 213
- 2
- 5
11
votes
3 answers
How you can trust your Router to not steal your private IPSec keys?
I would like to connect to my VPN using IPSec protocol.
For that, I need a router or any other device that support it.
I found this on…
Aminadav Glickshtein
- 285
- 2
- 13