Today, we’re kicking off our series of posts with one about IPsec. First of all — IPsec? What is it? IPsec is a suite of protocols that provide security for Internet communications at the IP layer [1]. It has three main goals: Authentication- Who sent the packet ? Integrity - Was the packet modified in transit? Confidentiality - Can anyone read the packet? Anti-replay - Did I already received it? One of the protocols that IPsec uses — and probably the most important — is called IKE [2]. The first version of IKE will be our main topic today. IKE stands for Internet Key Exchange. As the name suggests, the IKE protocol defines how negotiation between IPsec peers is carried out. Although we often refer to IKE and ISAKMP interchangeably, IKE actually inherits capabilities from three different protocols: ISAKMP : Provides a framework for authentication and key exchange but does not define them. OAKLEY : Describes a series of key exchanges, called modes. It also details the s...