Securing Communication of Legacy Applications with IPSec
Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software
Application Security Series
|
|
Table of Contents: Introduction • TCP/IP Security Vulnerabilities • What is IPSec? • Securing Data Transmission with IPSec • Creating and Deploying IPSec Policy • Selecting IPSec Authentication Type • Configuring IPSec Policy with Kerberos Authentication • Diffie-Hellman Groups • Configuring IPSec Policy with X.509 Certificates Authentication • Configuring Certificate Template • Testing • Conclusion • Resources |
|