Issue No. 06 - June (2004 vol. 37)
DOI Bookmark: http://doi.ieeecomputersociety.org/10.1109/MC.2004.30
Robert Friend , Hifn
<p>Avirtual private network uses IPsec to achieve its security. IPsec provides VPNs with confidentiality, data integrity, and end point authentication. Additionally, the VPN provides fordata compression, which increases Internet performance between sites. </p><p>Until now, IPsec VPN implementations have either used software to perform all VPN functions or added a lookaside security processor that interfaces to the host network processing components through an auxiliary control bus. These devices still require that the network processing components handle many tasks related to security functions. To provide network equipment manufacturers with a more complete, efficient, low-risk architecture that adds powerful security processing functionality, security processors must be placed directly in the data path by using a flow through security architecture.</p>
R. Friend, "Making the Gigabit IPsec VPN Architecture Secure," in Computer, vol. 37, no. , pp. 54-60, 2004.