6 TK800‑Series ‑ FAQ: IPsec
6.1 Preface
IPsec is an extension of the Internet Protocol (IP) with encryption and authentication mechanisms. This gives the
Internet Protocol the ability to transport IP packets over public and insecure networks in a cryptographically se‑
cured manner. IPsec was developed by the Internet Engineering Task Force (IETF) as an integral part of IPv6. Be‑
cause the Internet Protocol version 4 originally had no security mechanisms, IPsec was subsequently specified for
IPv4.
6.1.1 Components of IPsec‑VPNs
• Interoperability
• Cryptographic protection of transmitted data
• Access Control
• Data Integrity
• Authentication of the sender (user authentication)
• Encryption
• Key authentication
• Administration of keys (key management)
Behind these components are processes that, when combined, provide reliable security for data transmission over
public networks. VPN security solutions with high security requirements therefore generally rely on IPsec.
6.1.2 Deployment scenarios
• Subnet‑to‑Subnet‑VPN
• Host‑to‑Subnet‑VPN
• Host‑to‑Host‑VPN
In principle, IPsec is suitable for gateway‑to‑gateway scenarios. In other words, the connection between networks
via a third insecure network.
6.1.3 IPsec
By clicking VPN > IPsec, you can initially view the status of your IPsec tunnel, if you have already created one.
Welotec GmbH
Zum Hagenbach 7
48366 Laer
www.welotec.com
info@welotec.com
+49 2554 9130 00
Page 155