IP Security

Parent Previous Next

As the name suggests, the IP Security ( "IPsec" ) protocol suite is used to provide encryption and message authentication for IP communications. These protocols are defined by the IETF and published as RFC standards or working drafts. The Shrew Soft VPN Client makes every attempt to adhere to the following IPsec and key exchange related documents.


Standards




Working Drafts




Terminology



A host that directly participates in IPsec communications is referred to as an IPsec Peer. Peers use a set of Security Policies to determine which traffic requires protection or authentication. As with any method of secure communication, both parties involved must agree on a common set of parameters that define how data will be secured as well as share common key material. An established set of parameters and key material used to perform cryptographic services is referred to as a Security Association ( "SA" ).