Securing Communication of Legacy Applications with IPSec: Step-by-Step Guide to Protecting “Data in Transit” without Changes in Your Existing Software
By Slava Gomzin
()
About this ebook
Booklet for IT professionals, developers and security specialists on how to utilize IPSec protocol in order to protect data transmission between legacy applications which were created before secure communication became common practice. In many cases it is difficult or even impossible to make necessary changes in old software in order to implement commonly accepted secure protocols such as SSL/TLS. IPSec protocol can be utilized as inexpensive but powerful alternative solution which provides adequately high level of protection.
Topics include: what is IPSec and how to use it to secure data transmission, creating and deploying IPSec policy, overview or IPSec authentication types, configuring IPSec Policy with different types of authentication, and more (Article: ~2,180 words).
Table of Contents includes:
Introduction • TCP/IP Security Vulnerabilities • What is IPSec? • Securing Data Transmission with IPSec • Creating and Deploying IPSec Policy • Selecting IPSec Authentication Type • Configuring IPSec Policy with Kerberos Authentication • Diffie-Hellman Groups • Configuring IPSec Policy with X.509 Certificates Authentication • Configuring Certificate Template • Testing • Conclusion • Resources • About the Author
Slava Gomzin, CISSP, PCI ISA, ECSP, Security+ has more than 15 years of professional experience in software development and application security. He is Security Architect at Retalix USA.
Slava Gomzin
Slava Gomzin is a Security and Payments Technologist at Hewlett-Packard, where he helps create products that are integrated into modern payment processing ecosystems using the latest security and payments technologies. Prior to joining Hewlett-Packard, Slava was a security architect, corporate product security officer, R&D and application security manager, and development team leader at Retalix, a Division of NCR Retail. As PCI ISA, he focused on security and PA-DSS, PCI DSS, and PCI P2PE compliance of POS systems, payment applications, and gateways. Before moving into security, Slava worked in R&D on design and implementation of new products including next-generation POS systems and various interfaces to payment gateways and processors. Slava currently holds CISSP, PCIP, ECSP, and Security+ certifications. He blogs about payment security at www.gomzin.com.
Read more from Slava Gomzin
Hiding Web Traffic with SSH: How to Protect Your Internet Privacy against Corporate Firewall or Insecure Wireless Rating: 0 out of 5 stars0 ratingsProtecting Confidential Information: How to Securely Store Sensitive Data Rating: 0 out of 5 stars0 ratingsSecuring Email Communication: How to Protect Your Correspondence from Wiretapping Using Free Tools Rating: 0 out of 5 stars0 ratingsSecuring Application Deployment with Obfuscation and Code Signing: How to Create 3 Layers of Protection for .NET Release Build Rating: 0 out of 5 stars0 ratingsSecuring .NET Web Services with SSL: How to Protect “Data in Transit” between Client and Remote Server Rating: 0 out of 5 stars0 ratings
Related to Securing Communication of Legacy Applications with IPSec
Related ebooks
Practical VoIP Security Rating: 0 out of 5 stars0 ratingsCheckPoint NG VPN 1/Firewall 1: Advanced Configuration and Troubleshooting Rating: 5 out of 5 stars5/5The Best Damn Cisco Internetworking Book Period Rating: 5 out of 5 stars5/5Network address translation Second Edition Rating: 0 out of 5 stars0 ratingsConfiguring Juniper Networks NetScreen & SSG Firewalls Rating: 0 out of 5 stars0 ratingsConfiguring SonicWALL Firewalls Rating: 0 out of 5 stars0 ratingsManaging Cisco Network Security Rating: 3 out of 5 stars3/5Handbook of Networking & Connectivity Rating: 0 out of 5 stars0 ratingsSSCP Systems Security Certified Practitioner Study Guide and DVD Training System Rating: 0 out of 5 stars0 ratingsAdministering Cisco QoS in IP Networks: Including CallManager 3.0, QoS, and uOne Rating: 0 out of 5 stars0 ratingsSLA A Complete Guide Rating: 0 out of 5 stars0 ratingsInfoSecurity 2008 Threat Analysis Rating: 0 out of 5 stars0 ratingsWi-Fi Telephony: Challenges and Solutions for Voice over WLANs Rating: 5 out of 5 stars5/5Voice over Internet Protocol (VoIP) Security Rating: 0 out of 5 stars0 ratingsC# For Java Programmers Rating: 0 out of 5 stars0 ratingsHackproofing Your Wireless Network Rating: 0 out of 5 stars0 ratingsDesigning and Implementing Linux Firewalls and QoS using netfilter, iproute2, NAT and l7-filter Rating: 0 out of 5 stars0 ratingsHow to Cheat at VoIP Security Rating: 0 out of 5 stars0 ratingsWireless Operational Security Rating: 0 out of 5 stars0 ratingsDictionary of Information Security Rating: 1 out of 5 stars1/5CISSP Study Guide Rating: 3 out of 5 stars3/5Securing VoIP: Keeping Your VoIP Network Safe Rating: 5 out of 5 stars5/5Netcat Power Tools Rating: 3 out of 5 stars3/5Configuring IPv6 For Cisco IOS Rating: 0 out of 5 stars0 ratingsOWNED: Why hacking continues to be a problem Rating: 0 out of 5 stars0 ratingsEthical Hacking Rating: 0 out of 5 stars0 ratingsWebRTC: APIs and RTCWEB Protocols of the HTML5 Real-Time Web, Third Edition Rating: 5 out of 5 stars5/5