A clustering and traffic-redistribution scheme for high-performance IPsec VPNs
HiPC'05 Proceedings of the 12th international conference on High Performance Computing
LATONA: an advanced server architecture for ubiquitous sensor network
SAMOS'06 Proceedings of the 6th international conference on Embedded Computer Systems: architectures, Modeling, and Simulation
Hi-index | 4.10 |
Avirtual private network uses IPsec to achieve its security. IPsec provides VPNs with confidentiality, data integrity, and end point authentication. Additionally, the VPN provides fordata compression, which increases Internet performance between sites. Until now, IPsec VPN implementations have either used software to perform all VPN functions or added a lookaside security processor that interfaces to the host network processing components through an auxiliary control bus. These devices still require that the network processing components handle many tasks related to security functions. To provide network equipment manufacturers with a more complete, efficient, low-risk architecture that adds powerful security processing functionality, security processors must be placed directly in the data path by using a flow through security architecture.