IPsec

GPTKB entity

Statements (145)
Predicate Object
gptkbp:instance_of gptkb:protocol
gptkbp:can_be_combined_with other security protocols
gptkbp:can_be_configured_for authentication methods
encryption keys
security policies
site-to-site connections
gptkbp:can_be_used_to gptkb:IKE_(Internet_Key_Exchange)
gptkb:3_DES_encryption
gptkb:X.509_certificates
AES encryption
pre-shared keys
manual keying
SHA hashing
gptkbp:can_be_used_with gptkb:IPv4
gptkb:IKEv2
gptkb:IKEv1
gptkb:IPv6
Virtual Private Networks (VPNs)
site-to-site connections
remote access connections
gptkbp:can_provide end-to-end security
secure communication over untrusted networks
network-to-network security
gptkbp:composed_of gptkb:AH_(Authentication_Header)
gptkb:ESP_(Encapsulating_Security_Payload)
gptkbp:developed_by gptkb:Internet_Engineering_Task_Force
gptkb:IETF
https://www.w3.org/2000/01/rdf-schema#label IPsec
gptkbp:is_based_on gptkb:crypt
gptkbp:is_compatible_with gptkb:IPv4
gptkb:IPv6
routers
switches
firewalls
NAT traversal
security gateways
gptkbp:is_defined_by gptkb:RFC_2402
gptkb:RFC_2406
gptkb:RFC_2408
gptkb:RFC_2409
gptkb:RFC_2401
gptkb:RFC_4306
gptkbp:is_implemented_in gptkb:Linux
gptkb:software
gptkb:computer
gptkb:mac_OS
gptkb:Windows
operating systems
routers
firewalls
network appliances
VPN gateways
gptkbp:is_known_for complex configuration
gptkbp:is_often_used_in gptkb:cloud_services
corporate networks
enterprise networks
government networks
gptkbp:is_part_of gptkb:Internet_Protocol_suite
gptkb:security_services
data encryption standards
VPN technology
cybersecurity measures
data protection strategies
secure communication protocols
IP suite
secure networking solutions
network security frameworks
secure tunneling protocols
gptkbp:is_related_to gptkb:SSL/_TLS
network security
VPN protocols
gptkbp:is_standardized_by gptkb:RFC_2402
gptkb:RFC_2406
gptkb:RFC_2408
gptkb:IETF_RFC_4301
gptkb:RFC_2409
gptkb:RFC_2401
gptkb:RFC_4301
gptkb:RFC_4306
gptkb:RFC_5996
gptkbp:is_subject_to regulatory compliance
security audits
performance evaluations
various attacks
gptkbp:is_supported_by gptkb:Cisco
gptkb:Palo_Alto_Networks
gptkb:Fortinet
Juniper
network devices
most operating systems
gptkbp:is_used_by corporate networks
individual users
government networks
gptkbp:is_used_for secure data transmission
secure remote access
secure site-to-site connections
gptkbp:is_used_in gptkb:IPv4
gptkb:IPv6
VPNs
data protection
identity protection
remote work solutions
secure communications
secure email communications
Vo IP security
gptkbp:is_vulnerable_to man-in-the-middle attacks
packet sniffing
denial-of-service attacks
gptkbp:operates gptkb:protocol
gptkbp:operates_under gptkb:networking
network layer
gptkbp:provides confidentiality
data integrity
authentication
data confidentiality
data authentication
anti-replay protection
gptkbp:requires key management
key management protocols
gptkbp:support site-to-site connections
host-to-site connections
gptkbp:supports gptkb:IPv4
gptkb:IPv6
VPNs
Virtual Private Networks (VPNs)
security associations
gptkbp:used_for securing Internet Protocol communications
secure Internet Protocol communications
gptkbp:uses gptkb:Authentication_Header_(AH)
gptkb:Encapsulating_Security_Payload_(ESP)
gptkb:Internet_Key_Exchange_(IKE)
encryption
encryption protocols
encryption algorithms
authentication headers (AH)
encapsulating security payload (ESP)
authentication headers
encapsulating security payloads
gptkbp:bfsParent gptkb:crypt
gptkb:Diffie-Hellman_key_exchange
gptkb:operating_system
gptkb:IETF
gptkb:TCP/_IP
gptkb:Internet_services
gptkbp:bfsLayer 4