Posts

Showing posts from November, 2025

First Post

Image
Welcome to my blog! This is a space where I will share insights, learnings, and hands-on experiences. I plan to write about the technologies I am currently studying or working with. My goal is simply to learn and share what I have learned with others when I think it can be useful to other people. Hopefully I also become a better writter as well. Thank you for stopping by, and I look forward to sharing more in my next post!

IPSec Deep Dive

Image
Today, we’re kicking off our series of posts with one about IPsec. First of all — IPsec? What is it? IPsec is a suite of protocols that provide security for Internet communications at the IP layer [1]. It has three main goals: Authentication-  Who sent the packet ? Integrity - Was the packet modified in transit? Confidentiality -  Can anyone read the packet? Anti-replay -  Did I already received it? One of the protocols that IPsec uses — and probably the most important — is called IKE [2]. The first version of IKE will be our main topic today. IKE stands for Internet Key Exchange. As the name suggests, the IKE protocol defines how negotiation between IPsec peers is carried out. Although we often refer to IKE and ISAKMP interchangeably, IKE actually inherits capabilities from three different protocols: ISAKMP : Provides a framework for authentication and key exchange but does not define them. OAKLEY : Describes a series of key exchanges, called modes. It also details the s...