ABSTRACT

IPSec is an all-encompassing term much like VPN; however, it represents a suite of protocols and technologies that interact to accomplish a common goal. The technology of IPSec and the structure of the multifaceted operations that makes it a reality are sophisticated technologies in their own right. Communication management, setup and negotiation, authentication, traffic control, and policy implementation are only a few components of the design that produce the final architecture that is IPSec.