Properties (51)
Predicate | Object |
---|---|
gptkbp:instanceOf |
Library
|
gptkbp:canBe |
gptkb:IKE_(Internet_Key_Exchange)
|
gptkbp:engineConfiguration |
digital certificates
pre-shared keys host-to-site tunneling site-to-site tunneling |
https://www.w3.org/2000/01/rdf-schema#label |
IPsec VPNs
|
gptkbp:includes |
AH (Authentication Header)
ESP (Encapsulating Security Payload) |
gptkbp:integration |
SIEM systems
|
gptkbp:isAttendedBy |
IETF
|
gptkbp:isCompatibleWith |
IPv4
IPv6 |
gptkbp:isCounteredBy |
network security tools
security compliance frameworks |
gptkbp:isDedicatedTo |
secure key management
strong encryption algorithms |
gptkbp:isFacilitatedBy |
secure remote work
|
gptkbp:isLedBy |
high-latency connections
|
gptkbp:isLocatedIn |
routers
firewalls |
gptkbp:isOftenMadeWith |
firewall rules
NAT traversal techniques |
gptkbp:isOftenUsedIn |
financial services
e-commerce transactions |
gptkbp:isPartOf |
network security architecture
|
gptkbp:isSubjectTo |
regulatory requirements
|
gptkbp:isSupportedBy |
most operating systems
most network devices |
gptkbp:isUsedFor |
remote access
protect sensitive data site-to-site connections connect branch offices secure VoIP communications L2TP (Layer 2 Tunneling Protocol) SSL_VPNs |
gptkbp:isUsedIn |
cloud services
corporate networks telecommuting government networks |
gptkbp:isVisitedBy |
high-security environments
|
gptkbp:isVulnerableTo |
man-in-the-middle attacks
|
gptkbp:operatesIn |
Internet Protocol
|
gptkbp:provides |
data integrity
data confidentiality secure communication data authenticity |
gptkbp:requires |
proper configuration
|
gptkbp:supports |
encryption
authentication |
gptkbp:uses |
gptkb:IPsec_protocol
|