2003
DOI: 10.17487/rfc3457
|View full text |Cite
|
Sign up to set email alerts
|

Requirements for IPsec Remote Access Scenarios

Abstract: IPsec offers much promise as a secure remote access mechanism. However, there are a number of differing remote access scenarios, each having some shared and some unique requirements. A thorough understanding of these requirements is necessary in order to effectively evaluate the suitability of a specific set of mechanisms for any particular remote access scenario. This document enumerates the requirements for a number of common remote access scenarios.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
9
0
2

Year Published

2003
2003
2015
2015

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(11 citation statements)
references
References 0 publications
0
9
0
2
Order By: Relevance
“…Leveraging DHCP for configuration of IPsec tunnel mode meets the basic requirements described in [21]. It also provides the additional capabilities described above.…”
Section: Dhcp Configuration Evaluationmentioning
confidence: 98%
See 4 more Smart Citations
“…Leveraging DHCP for configuration of IPsec tunnel mode meets the basic requirements described in [21]. It also provides the additional capabilities described above.…”
Section: Dhcp Configuration Evaluationmentioning
confidence: 98%
“…As described in [21], the configuration requirements of a host with an IPsec tunnel mode interface include the need to obtain an IPv4 address and other configuration parameters appropriate to the class of host. In addition to meeting the basic requirements [21], the following additional capabilities may be desirable:…”
Section: Ipsec Tunnel Mode Configuration Requirementsmentioning
confidence: 99%
See 3 more Smart Citations