Internet Protocol Security (IPsec) is designed and used to provide secure connections between nodes and networks throughout the internet. IPsec has become the standard for most of the IP Virtual Private Network (VPN) technology.

IPsec can operate in a point-to-point (aka host-to-host) configuration or in a site-to-site (aka network-to-network) configuration. An IPsec implementation operates in a host, as a Security Gateway (SG), or as an independent device, affording protection to IP traffic for both IPv4 and IPv6. (A security gateway is an intermediate system implementing IPsec, for example a firewall, router or gateway which has been IPsec-enabled.)

There are many benefits of using IPsec. These include, but are not limited to:

  • Secure connectivity provided across distributed enterprises
  • Bandwidth benefits over traditionally expensive Wide Area Network (WAN) infrastructure
  • Cost benefits over traditionally expensive WAN infrastructure
  • Security - IPsec VPNs inherently provide a high degree of data security
  • Flexibility - IPsec VPNs can be established and be available using the internet
  • Resilience and High Availability (HA) for critical and sensitive applications available over the internet

For further information, including step-by-step instructions on how to configure the LoadMaster to work with IPsec tunneling, refer to the IPsec Tunneling, Feature Description.