IP Security One problem with Internet protocol (IP) is that it has no method for confirming the authenticity and security of data as it moves through the net. IP datagrams are typically routed between devices over disparate networks; as a result, information within these datagrams could be intercepted and altered. As use of the Internet for critical applications has increased, the need for enhancements to IP security became necessary. As a result, the Internet Engineering Task Force (IETF) created a set of protocols called IP Security, or IPsec, to support the secure exchange of packets over the Internet. IPsec is now a mandatory component of IPv6 and must be supported for any IPv6 implementation. IPsec is implemented in IPv6 using the authentication header (AH) and the encapsulating security payload (ESP) extension header. Answer the following questions in a 3- to 4-page, APA-formatted paper: 1 What is IPsec, and why is it necessary? How is IPsec used in VPN? 2 Which network layer currently suffers from attacks, and why? At which layers of the network stack architecture should a solution be attempted? Provide details. 3 How is IP security achieved? What is the basic authentication scheme? Which mechanisms are used? What are some of the application venues of IPsec? 4 How is a VPN implemented on a server so that its clients can connect to it? Remember to properly cite your sources according to APA guidelines. Solution IPSec IPsec also known as IP Security.Internet Protocol Security is a framework for a set of protocols that provide security for internet protocol. It can use cryptography to provide security. IPsec support network level data integrity, data confidentiality. As it is integrated at the internet layer (i.e. layer 3), it provides security for all the protocols in the TCP/IP. IPsec applied transparently to the applications, there is no need to configure separate security for each application the uses TCP/IP. IPsec provides security for IPsec provides two choices of security service: Authentication Header (AH), which essentially allows authentication of the sender of data, and Encapsulating Security Payload (ESP), which supports both authentication of the sender and encryption of data as well. The specific information associated with each of these services is inserted into the packet in a header that follows the IP packet header. Separate key protocols can be selected, such as the ISAKMP/Oakley protocol. IPsec is necessary for Earlier security approaches have inserted security at the Application layer of the communications model. IPsec is said to be especially useful for implementing virtual private networks and for remote user access through dial-up connection to private networks. A big advantage of IPsec is that security arrangements can be handled without requiring changes to individual user computers. Cisco has been a leader in proposing IPsec as a standard (or combination of standards and technologies) and has included support fo.