Stories by Serge-Paul Carrasco

Overlay network for security policies

One way to ensure the security of business transactions, customer data and intellectual property is to use IPSec to provide data encryption and authentication services. However, the management of IPSec policies and the Internet Key Exchange protocol -- which is used for the authentication of end nodes and the creation of the IPSec security associations -- present some practical deployment limitations. These constraints can be addressed using a three-layer approach to security.