So let's move on to the IPsec architecture. In the next coming two slides I will be talking about it IPsec which is Internet Protocol security is used to encrypt the data in VPN tunnels. Internet Security Association and key management also known as ice cam and IPsec are the two main protocol used to encrypt VPN tunnels. other components that are part of the encryptions are security Association. Now when it comes to security Association, this is the basically the database that the routers or the firewalls will keep on in their in their Ram. Then you have authentication headers, That's basically added into the payload of the IP packet.
Then the other component is encapsulation security payload. Which we will see that in the next slide. And the internet key exchange which is ik II, which is also referred to Isaac cam. It is the negotiation protocol between the sites. It's important to note that the driver maintaining all these component is i ke or IC cam protocol. It creates the tunnel to protect the ISO camp messages.
It acts as the Management Protocol. It creates the kernel and also protect the data. So basically the layer that the ice can place is a very important layer. It helps in the negotiation messages and in other communications between the tunnel whereas IPsec feature is only to provide encryption of the data using algorithms that result in all the IPsec features that I mentioned in the previous slide, which is basically transparent to the application provides data integrity and data confidentiality. I hope this sums up the IPsec architecture. There's also some of the RFCs that you can go into to read more about it in detail.
RFC 43, zero to 43 03 That is a good good hand books that you can actually read on more about IPsec. Now, this course is not 3d projecting the theoretical aspect of IPsec this course is mainly helping you into real world and it's from a practical point of view. So my my information on IPsec is going to be very precise, detailed information, you can either refer to these RFCs for your own information. Okay, thank you.