This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Making the Gigabit IPsec VPN Architecture Secure
June 2004 (vol. 37 no. 6)
pp. 54-60

Avirtual private network uses IPsec to achieve its security. IPsec provides VPNs with confidentiality, data integrity, and end point authentication. Additionally, the VPN provides fordata compression, which increases Internet performance between sites.

Until now, IPsec VPN implementations have either used software to perform all VPN functions or added a lookaside security processor that interfaces to the host network processing components through an auxiliary control bus. These devices still require that the network processing components handle many tasks related to security functions. To provide network equipment manufacturers with a more complete, efficient, low-risk architecture that adds powerful security processing functionality, security processors must be placed directly in the data path by using a flow through security architecture.

Citation:
Robert Friend, "Making the Gigabit IPsec VPN Architecture Secure," Computer, vol. 37, no. 6, pp. 54-60, June 2004, doi:10.1109/MC.2004.30
Usage of this product signifies your acceptance of the Terms of Use.