Statements (145)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:protocol
|
gptkbp:can_be_combined_with |
other security protocols
|
gptkbp:can_be_configured_for |
authentication methods
encryption keys security policies site-to-site connections |
gptkbp:can_be_used_to |
gptkb:IKE_(Internet_Key_Exchange)
gptkb:3_DES_encryption gptkb:X.509_certificates AES encryption pre-shared keys manual keying SHA hashing |
gptkbp:can_be_used_with |
gptkb:IPv4
gptkb:IKEv2 gptkb:IKEv1 gptkb:IPv6 Virtual Private Networks (VPNs) site-to-site connections remote access connections |
gptkbp:can_provide |
end-to-end security
secure communication over untrusted networks network-to-network security |
gptkbp:composed_of |
gptkb:AH_(Authentication_Header)
gptkb:ESP_(Encapsulating_Security_Payload) |
gptkbp:developed_by |
gptkb:Internet_Engineering_Task_Force
gptkb:IETF |
https://www.w3.org/2000/01/rdf-schema#label |
IPsec
|
gptkbp:is_based_on |
gptkb:crypt
|
gptkbp:is_compatible_with |
gptkb:IPv4
gptkb:IPv6 routers switches firewalls NAT traversal security gateways |
gptkbp:is_defined_by |
gptkb:RFC_2402
gptkb:RFC_2406 gptkb:RFC_2408 gptkb:RFC_2409 gptkb:RFC_2401 gptkb:RFC_4306 |
gptkbp:is_implemented_in |
gptkb:Linux
gptkb:software gptkb:computer gptkb:mac_OS gptkb:Windows operating systems routers firewalls network appliances VPN gateways |
gptkbp:is_known_for |
complex configuration
|
gptkbp:is_often_used_in |
gptkb:cloud_services
corporate networks enterprise networks government networks |
gptkbp:is_part_of |
gptkb:Internet_Protocol_suite
gptkb:security_services data encryption standards VPN technology cybersecurity measures data protection strategies secure communication protocols IP suite secure networking solutions network security frameworks secure tunneling protocols |
gptkbp:is_related_to |
gptkb:SSL/_TLS
network security VPN protocols |
gptkbp:is_standardized_by |
gptkb:RFC_2402
gptkb:RFC_2406 gptkb:RFC_2408 gptkb:IETF_RFC_4301 gptkb:RFC_2409 gptkb:RFC_2401 gptkb:RFC_4301 gptkb:RFC_4306 gptkb:RFC_5996 |
gptkbp:is_subject_to |
regulatory compliance
security audits performance evaluations various attacks |
gptkbp:is_supported_by |
gptkb:Cisco
gptkb:Palo_Alto_Networks gptkb:Fortinet Juniper network devices most operating systems |
gptkbp:is_used_by |
corporate networks
individual users government networks |
gptkbp:is_used_for |
secure data transmission
secure remote access secure site-to-site connections |
gptkbp:is_used_in |
gptkb:IPv4
gptkb:IPv6 VPNs data protection identity protection remote work solutions secure communications secure email communications Vo IP security |
gptkbp:is_vulnerable_to |
man-in-the-middle attacks
packet sniffing denial-of-service attacks |
gptkbp:operates |
gptkb:protocol
|
gptkbp:operates_under |
gptkb:networking
network layer |
gptkbp:provides |
confidentiality
data integrity authentication data confidentiality data authentication anti-replay protection |
gptkbp:requires |
key management
key management protocols |
gptkbp:support |
site-to-site connections
host-to-site connections |
gptkbp:supports |
gptkb:IPv4
gptkb:IPv6 VPNs Virtual Private Networks (VPNs) security associations |
gptkbp:used_for |
securing Internet Protocol communications
secure Internet Protocol communications |
gptkbp:uses |
gptkb:Authentication_Header_(AH)
gptkb:Encapsulating_Security_Payload_(ESP) gptkb:Internet_Key_Exchange_(IKE) encryption encryption protocols encryption algorithms authentication headers (AH) encapsulating security payload (ESP) authentication headers encapsulating security payloads |
gptkbp:bfsParent |
gptkb:crypt
gptkb:Diffie-Hellman_key_exchange gptkb:operating_system gptkb:IETF gptkb:TCP/_IP gptkb:Internet_services |
gptkbp:bfsLayer |
4
|