{"id":1053,"date":"2022-07-16T11:49:11","date_gmt":"2022-07-16T11:49:11","guid":{"rendered":"https:\/\/www.kayimpex.com\/blog\/?p=1053"},"modified":"2022-12-12T10:26:13","modified_gmt":"2022-12-12T10:26:13","slug":"it-simplified-ipsec","status":"publish","type":"post","link":"https:\/\/www.kayimpex.com\/blog\/2022\/07\/16\/it-simplified-ipsec\/","title":{"rendered":"IT Simplified: IPsec"},"content":{"rendered":"\n<p>What is IPsec?<\/p>\n\n\n\n<p>IPsec is a group of protocols that are used together to set up encrypted connections between devices. It helps keep data sent over public networks secure. IPsec is often used to set up VPNs, and it works by encrypting IP packets, along with authenticating the source where the packets come from.<\/p>\n\n\n\n<p>Within the term &#8220;IPsec,&#8221; &#8220;IP&#8221; stands for &#8220;Internet Protocol&#8221; and &#8220;sec&#8221; for &#8220;secure.&#8221; The Internet Protocol is the main routing protocol used on the Internet; it designates where data will go using IP addresses. IPsec is secure because it adds encryption* and authentication to this process.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p>*Encryption is the process of concealing information by mathematically altering data so that it appears random. In simpler terms, encryption is the use of a &#8220;secret code&#8221; that only authorized parties can interpret.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/www.kayimpex.com\/blog\/wp-content\/uploads\/2022\/07\/IP-sec-image-1-1024x538.jpg\" alt=\"\" class=\"wp-image-1055\" srcset=\"https:\/\/www.kayimpex.com\/blog\/wp-content\/uploads\/2022\/07\/IP-sec-image-1-1024x538.jpg 1024w, https:\/\/www.kayimpex.com\/blog\/wp-content\/uploads\/2022\/07\/IP-sec-image-1-300x158.jpg 300w, https:\/\/www.kayimpex.com\/blog\/wp-content\/uploads\/2022\/07\/IP-sec-image-1-768x403.jpg 768w, https:\/\/www.kayimpex.com\/blog\/wp-content\/uploads\/2022\/07\/IP-sec-image-1.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>What is a VPN? What is an IPsec VPN?<\/p>\n\n\n\n<p>A virtual private network (VPN) is an encrypted connection between two or more computers. VPN connections take place over public networks, but the data exchanged over the VPN is still private because it is encrypted.<\/p>\n\n\n\n<p>VPNs make it possible to securely access and exchange confidential data over shared network infrastructure, such as the public Internet. For instance, when employees are working remotely instead of in the office, they often use VPNs to access corporate files and applications.<\/p>\n\n\n\n<p>Many VPNs use the IPsec protocol suite to establish and run these encrypted connections. However, not all VPNs use IPsec. Another protocol for VPNs is SSL\/TLS, which operates at a different layer in the OSI model than IPsec. (The OSI model is an abstract representation of the processes that make the Internet work.)<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is IPsec? IPsec is a group of protocols that are used together to set up encrypted connections between devices. [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":1054,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[11],"tags":[],"class_list":["post-1053","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IT Simplified: IPsec -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.kayimpex.com\/blog\/2022\/07\/16\/it-simplified-ipsec\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IT Simplified: IPsec -\" \/>\n<meta property=\"og:description\" content=\"What is IPsec? IPsec is a group of protocols that are used together to set up encrypted connections between devices. [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.kayimpex.com\/blog\/2022\/07\/16\/it-simplified-ipsec\/\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/kayimpex\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-07-16T11:49:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-12T10:26:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.kayimpex.com\/blog\/wp-content\/uploads\/2022\/07\/IP-sec-image-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Krishna Jhaveri\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@kay_impex\" \/>\n<meta name=\"twitter:site\" content=\"@kay_impex\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Krishna Jhaveri\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.kayimpex.com\/blog\/2022\/07\/16\/it-simplified-ipsec\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.kayimpex.com\/blog\/2022\/07\/16\/it-simplified-ipsec\/\"},\"author\":{\"name\":\"Krishna Jhaveri\",\"@id\":\"https:\/\/www.kayimpex.com\/blog\/#\/schema\/person\/ee6166c7a6bca1984bc8b7178664b24c\"},\"headline\":\"IT Simplified: IPsec\",\"datePublished\":\"2022-07-16T11:49:11+00:00\",\"dateModified\":\"2022-12-12T10:26:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.kayimpex.com\/blog\/2022\/07\/16\/it-simplified-ipsec\/\"},\"wordCount\":276,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.kayimpex.com\/blog\/#organization\"},\"articleSection\":[\"security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.kayimpex.com\/blog\/2022\/07\/16\/it-simplified-ipsec\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.kayimpex.com\/blog\/2022\/07\/16\/it-simplified-ipsec\/\",\"url\":\"https:\/\/www.kayimpex.com\/blog\/2022\/07\/16\/it-simplified-ipsec\/\",\"name\":\"IT Simplified: IPsec -\",\"isPartOf\":{\"@id\":\"https:\/\/www.kayimpex.com\/blog\/#website\"},\"datePublished\":\"2022-07-16T11:49:11+00:00\",\"dateModified\":\"2022-12-12T10:26:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.kayimpex.com\/blog\/2022\/07\/16\/it-simplified-ipsec\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.kayimpex.com\/blog\/2022\/07\/16\/it-simplified-ipsec\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.kayimpex.com\/blog\/2022\/07\/16\/it-simplified-ipsec\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.kayimpex.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IT Simplified: IPsec\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.kayimpex.com\/blog\/#website\",\"url\":\"https:\/\/www.kayimpex.com\/blog\/\",\"name\":\"kayimpex.com\",\"description\":\"Understanding Cyber Security Trends in 2024\",\"publisher\":{\"@id\":\"https:\/\/www.kayimpex.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.kayimpex.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.kayimpex.com\/blog\/#organization\",\"name\":\"Kay Impex\",\"url\":\"https:\/\/www.kayimpex.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.kayimpex.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.kayimpex.com\/blog\/wp-content\/uploads\/2024\/09\/PastedGraphic-4-1.png\",\"contentUrl\":\"https:\/\/www.kayimpex.com\/blog\/wp-content\/uploads\/2024\/09\/PastedGraphic-4-1.png\",\"width\":153,\"height\":91,\"caption\":\"Kay Impex\"},\"image\":{\"@id\":\"https:\/\/www.kayimpex.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/kayimpex\/\",\"https:\/\/twitter.com\/kay_impex\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.kayimpex.com\/blog\/#\/schema\/person\/ee6166c7a6bca1984bc8b7178664b24c\",\"name\":\"Krishna Jhaveri\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.kayimpex.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8a532be5c3f43bc3d1be6ef69353a6cf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8a532be5c3f43bc3d1be6ef69353a6cf?s=96&d=mm&r=g\",\"caption\":\"Krishna Jhaveri\"},\"url\":\"https:\/\/www.kayimpex.com\/blog\/author\/janhavi\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IT Simplified: IPsec -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.kayimpex.com\/blog\/2022\/07\/16\/it-simplified-ipsec\/","og_locale":"en_US","og_type":"article","og_title":"IT Simplified: IPsec -","og_description":"What is IPsec? IPsec is a group of protocols that are used together to set up encrypted connections between devices. [&hellip;]","og_url":"https:\/\/www.kayimpex.com\/blog\/2022\/07\/16\/it-simplified-ipsec\/","article_publisher":"https:\/\/www.facebook.com\/kayimpex\/","article_published_time":"2022-07-16T11:49:11+00:00","article_modified_time":"2022-12-12T10:26:13+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.kayimpex.com\/blog\/wp-content\/uploads\/2022\/07\/IP-sec-image-2.jpg","type":"image\/jpeg"}],"author":"Krishna Jhaveri","twitter_card":"summary_large_image","twitter_creator":"@kay_impex","twitter_site":"@kay_impex","twitter_misc":{"Written by":"Krishna Jhaveri","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.kayimpex.com\/blog\/2022\/07\/16\/it-simplified-ipsec\/#article","isPartOf":{"@id":"https:\/\/www.kayimpex.com\/blog\/2022\/07\/16\/it-simplified-ipsec\/"},"author":{"name":"Krishna Jhaveri","@id":"https:\/\/www.kayimpex.com\/blog\/#\/schema\/person\/ee6166c7a6bca1984bc8b7178664b24c"},"headline":"IT Simplified: IPsec","datePublished":"2022-07-16T11:49:11+00:00","dateModified":"2022-12-12T10:26:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.kayimpex.com\/blog\/2022\/07\/16\/it-simplified-ipsec\/"},"wordCount":276,"commentCount":0,"publisher":{"@id":"https:\/\/www.kayimpex.com\/blog\/#organization"},"articleSection":["security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.kayimpex.com\/blog\/2022\/07\/16\/it-simplified-ipsec\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.kayimpex.com\/blog\/2022\/07\/16\/it-simplified-ipsec\/","url":"https:\/\/www.kayimpex.com\/blog\/2022\/07\/16\/it-simplified-ipsec\/","name":"IT Simplified: IPsec -","isPartOf":{"@id":"https:\/\/www.kayimpex.com\/blog\/#website"},"datePublished":"2022-07-16T11:49:11+00:00","dateModified":"2022-12-12T10:26:13+00:00","breadcrumb":{"@id":"https:\/\/www.kayimpex.com\/blog\/2022\/07\/16\/it-simplified-ipsec\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.kayimpex.com\/blog\/2022\/07\/16\/it-simplified-ipsec\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.kayimpex.com\/blog\/2022\/07\/16\/it-simplified-ipsec\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.kayimpex.com\/blog\/"},{"@type":"ListItem","position":2,"name":"IT Simplified: IPsec"}]},{"@type":"WebSite","@id":"https:\/\/www.kayimpex.com\/blog\/#website","url":"https:\/\/www.kayimpex.com\/blog\/","name":"kayimpex.com","description":"Understanding Cyber Security Trends in 2024","publisher":{"@id":"https:\/\/www.kayimpex.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.kayimpex.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.kayimpex.com\/blog\/#organization","name":"Kay Impex","url":"https:\/\/www.kayimpex.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kayimpex.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.kayimpex.com\/blog\/wp-content\/uploads\/2024\/09\/PastedGraphic-4-1.png","contentUrl":"https:\/\/www.kayimpex.com\/blog\/wp-content\/uploads\/2024\/09\/PastedGraphic-4-1.png","width":153,"height":91,"caption":"Kay Impex"},"image":{"@id":"https:\/\/www.kayimpex.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/kayimpex\/","https:\/\/twitter.com\/kay_impex"]},{"@type":"Person","@id":"https:\/\/www.kayimpex.com\/blog\/#\/schema\/person\/ee6166c7a6bca1984bc8b7178664b24c","name":"Krishna Jhaveri","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kayimpex.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8a532be5c3f43bc3d1be6ef69353a6cf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8a532be5c3f43bc3d1be6ef69353a6cf?s=96&d=mm&r=g","caption":"Krishna Jhaveri"},"url":"https:\/\/www.kayimpex.com\/blog\/author\/janhavi\/"}]}},"featured_media_src_url":"https:\/\/www.kayimpex.com\/blog\/wp-content\/uploads\/2022\/07\/IP-sec-image-2-1024x538.jpg","_links":{"self":[{"href":"https:\/\/www.kayimpex.com\/blog\/wp-json\/wp\/v2\/posts\/1053"}],"collection":[{"href":"https:\/\/www.kayimpex.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kayimpex.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kayimpex.com\/blog\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kayimpex.com\/blog\/wp-json\/wp\/v2\/comments?post=1053"}],"version-history":[{"count":3,"href":"https:\/\/www.kayimpex.com\/blog\/wp-json\/wp\/v2\/posts\/1053\/revisions"}],"predecessor-version":[{"id":1279,"href":"https:\/\/www.kayimpex.com\/blog\/wp-json\/wp\/v2\/posts\/1053\/revisions\/1279"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kayimpex.com\/blog\/wp-json\/wp\/v2\/media\/1054"}],"wp:attachment":[{"href":"https:\/\/www.kayimpex.com\/blog\/wp-json\/wp\/v2\/media?parent=1053"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kayimpex.com\/blog\/wp-json\/wp\/v2\/categories?post=1053"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kayimpex.com\/blog\/wp-json\/wp\/v2\/tags?post=1053"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}