This is a format test, please ignore.
IPsec provides us with a framework by which to secure data
communications at the network layer of the OSI model, or, more
specifically, to secure IP communications. In order to do so, the
IPsec standard incorporates a number of protocols into the IPsec
protocol suite. As such, IPsec is not defined as a single protocol,
but is instead a collection of protocols, each focusing on particular
elements of the IPsec mission to secure IP communications over
untrusted networks. We've discussed in detail the operation of many
different cryptographic components designed to deliver services such
as data authentication, data confidentiality, data integrity, and
data nonrepudiation to IP communications. Within the IPsec protocol,
there are protocols that provide a means by which to ensure all of
these services in a VPN implementation. This assurance is the reason
that IPsec is widely considered to be one of the most comprehensively
effective VPN choices available in enterprise and commercial markets
today. Examples of protocols included in the IPsec protocol suite
that are focused on delivering message authenticity, data integrity,
data confidentiality, and sender nonrepudiation include IKE for
authenticity and the Encapsulating Security Payload for
confidentiality. We will explore these protocols and others as we
present a comprehensive overview of the mechanics of IPsec.
================================================================================
Tu Ne Cede Malis