Definitions

Sorry, no definitions found. You may find more data at ipsec.

Etymologies

Sorry, no etymologies found.

Support

Help support Wordnik (and make this page ad-free) by adopting the word IPsec.

Examples

  • Inter-host security is really a problem for higher layers, such as IPsec and application-layer security.

    Snell-Pym » More on n2n 2008

  • Shrew Soft works with a variety of VPN server protocols including IPsec, OpenSWAN, freeSWAN, and strongSWAN.

    Five Best VPN Tools | Lifehacker Australia 2010

  • Years ago when we used encryption with IPsec [Internet protocol security] we had to share our encryption methodology with governments just to have the branch office tunnel to offices in their country.

    Border Crossings For Data 2010

  • Years ago when we used encryption with IPsec [Internet protocol security] we had to share our encryption methodology with governments just to have the branch office tunnel to offices in their country.

    Border Crossings For Data 2010

  • Shrew Soft works with a variety of VPN server protocols including IPsec, OpenSWAN, freeSWAN, and strongSWAN.

    Five Best VPN Tools | Lifehacker Australia 2010

  • Years ago when we used encryption with IPsec [Internet protocol security] we had to share our encryption methodology with governments just to have the branch office tunnel to offices in their country.

    Border Crossings For Data 2010

  • Access based on IP address is a little nuts in a LAN environment - eventually you might want to move towards something like connection security policies - where you can use IPsec to restrict access to hosts on the network based on computer certificate and blocking / allowing access on that basis which frees you up to use dynamic IP addressing.

    Cheeseburger Gothic » Lil He’p 2009

  • Actually the “everyone is on the internet” approach is where the IPsec/certificates thing is going - it is the basis of DirectAccess, which is a new feature in Win7 & 2K8R2.

    Cheeseburger Gothic » Lil He’p 2009

  • Pages 283-296: how to use Windows IPsec policies to stop worms, protect your network servers from rogue clients, and implement domain isolation Domain isolation = devices cannot communicate with your domain resources unless they are domain-joined and have the proper IPsec policies.

    2005 December 2005

  • Pages 283-296: how to use Windows IPsec policies to stop worms, protect your network servers from rogue clients, and implement domain isolation Domain isolation = devices cannot communicate with your domain resources unless they are domain-joined and have the proper IPsec policies.

    Review: Protect Your Windows Network by Jesper M. Johansson and Steve Riley (Addison-Wesley) 2005

Comments

Log in or sign up to get involved in the conversation. It's quick and easy.