Dynamic Management of IPSec Security Policies Distribution
نویسنده
چکیده
Because of different constraints such as the customers unceasing requirements, the large distribution of systems, the permanent modifications of the management environments themselves, etc., the environments devoted to the management of the inter-domain communications security must be generally dynamic and policy based. In this work, we will present a management environment, that is mainly based on a dynamic platform, to policy-based manage the inter-domain communications security. Our proposed platform uses IPSec protocol and is composed of a security IPSec Server (IPSecServ) to decide and perform all management tasks, a Monitoring Service (MS) to automate the IPSecServ functioning, and a Policy Decision Point (PDP) with a set of Policy Enforcement Points (PEPs) to decide and distribute IPSec security policies. Moreover, our proposed approach integrates also domains, roles, and policies specification language PONDER to organise the environment components and facilitate their management. A prototype is implemented by using CORBA environment and some experimental results are also presented.
منابع مشابه
Behavioral and Performance Characteristics of IPsec/IKE in Large-Scale VPNs
Cryptographic network security services are essential for providing secure data communication over an insecure public network such as the Internet. Recently there has been tremendous growth in the requirements for, and use of, secure virtual private networks (VPNs) to interconnect enterprises with business partners, traveling staff, and remote office locations. Internet Protocol Security (IPsec...
متن کاملIPsec/VPN security policy correctness and assurance
With IPSec/VPN policies being widely deployed, how to correctly specify and configure them is critical in enforcing security requirements. Under current practice, IPSec/VPN policies are usually specified manually by system administrators and thus prone to errors. However, dynamic aspects in the network may interfere with the existing policy set up and thus cause unexpected conflict. To deal wit...
متن کاملIPSec/VPN Security Policy: Correctness, Conflict Detection and Resolution1
IPSec (Internet Security Protocol Suite) functions will be executed correctly only if its policies are correctly specified and configured. Manual IPSec policy configuration is inefficient and error-prone. An erroneous policy could lead to communication blockade or serious security breach. In addition, even if policies are specified correctly in each domain, the diversified regional security pol...
متن کاملIPSec/VPN Security Policy: Correctness, Conflict Detection, and Resolution
IPSec (Internet Security Protocol Suite) functions will be executed correctly only if its policies are correctly specified and configured. Manual IPSec policy configuration is inefficient and error-prone. An erroneous policy could lead to communication blockade or serious security breach. In addition, even if policies are specified correctly in each domain, the diversified regional security pol...
متن کاملIpsec / Vpn Security Policy Engineering : Automatic Generation and Conflict Detection
IPsec is a useful IP layer security protocol which can provide authentication and encryption for end-to-end traffic flow, but configuring IPsec VPN tunnels is notoriously complicated because it has so many options (key exchange, ciphers, authentication etc) to configure. Thus the ultimate solutions to the security requirements are often prone to errors, let alone that dynamic routing changes ca...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007