Guidelines for mandating the use of ipsec

Without obtaining an adequate license from the person(s) controlling the copyright in such materials, this document may not be modified outside the IETF Standards Process, and derivative works of it may not be created outside the IETF Standards Process, except to format it for publication as an RFC or to translate it into languages other than English.Abstract The Security Considerations sections of many Internet Drafts say, in effect, "just use IPsec".In addition, where possible and appropriate, passwords or other secure authentication mechanisms must be used for local (console) logins.Kiosks conforming to the Campus Guidelines for Kiosk Workstations are exempted from this requirement.Authentication keeps unauthorized people from using your computer or device.

Instead, it is mainly used today as an “all or nothing” protection for VPNs.

Status of This Memo This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements. Copyright Notice Copyright (c) 2009 IETF Trust and the persons identified as the document authors. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents in effect on the date of publication of this document (

Please review these documents carefully, as they describe your rights and restrictions with respect to this document.

Note that other groups may also distribute working documents as Internet- Drafts.

Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time.

It is inappropriate to use Internet- Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at list of Internet-Draft Shadow Directories can be accessed at

You must have an account to comment. Please register or login here!