PKI and IPSec are the widely used technologies in today's information security area. In this paper ,PKI andIPSec are discussed briefly at first. Then two methods of combining PKI with IPSec are proposed with detai...PKI and IPSec are the widely used technologies in today's information security area. In this paper ,PKI andIPSec are discussed briefly at first. Then two methods of combining PKI with IPSec are proposed with details,andhow to use PKI in IPSec configuration management is also discussed. Finally,it points out that identity of IPSec com-munication entity may be the special user but not limited to IP address with PKI. It also points out that PKI makes a-thentication of IPSec entity more secure and reliable,and makes IPSec configurations more flexible.展开更多
文摘PKI and IPSec are the widely used technologies in today's information security area. In this paper ,PKI andIPSec are discussed briefly at first. Then two methods of combining PKI with IPSec are proposed with details,andhow to use PKI in IPSec configuration management is also discussed. Finally,it points out that identity of IPSec com-munication entity may be the special user but not limited to IP address with PKI. It also points out that PKI makes a-thentication of IPSec entity more secure and reliable,and makes IPSec configurations more flexible.