{"id":460,"date":"2016-06-02T17:41:39","date_gmt":"2016-06-02T14:41:39","guid":{"rendered":"http:\/\/www.bilisimonline.net\/?p=460"},"modified":"2017-05-30T16:09:54","modified_gmt":"2017-05-30T13:09:54","slug":"ipsec-internet-protocol-security","status":"publish","type":"post","link":"http:\/\/www.bilisimonline.net\/index.php\/2016\/06\/02\/ipsec-internet-protocol-security\/","title":{"rendered":"IPSec (Internet Protocol Security)"},"content":{"rendered":"<p align=\"JUSTIFY\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Merhaba bu yaz\u0131m\u0131zda sizlere IPSec Nedir, nas\u0131l \u00e7al\u0131\u015f\u0131r\u0131 anlataca\u011f\u0131z. IPSec (Internet Protocol Security veya Internet Protokol\u00fc g\u00fcvenli\u011fi) isminden de anla\u015f\u0131laca\u011f\u0131 \u00fczere Internet Protokol\u00fc (IP) kullan\u0131lan ileti\u015fimlerde do\u011frulama ve \u015fifreleme kullanarak g\u00fcvenli\u011fini sa\u011flayan, IETF (Internet Engineering Task Force) taraf\u0131ndan geli\u015ftirilmi\u015f bir protokold\u00fcr. Biraz tarih\u00e7esini inceledi\u011fimizde Aral\u0131k 1993&#8217;de Yaz\u0131l\u0131m Ip \u015eifreleme Protokol\u00fc swIPe John IOANNIDIS ve tak\u0131m arkada\u015flar\u0131 taraf\u0131ndan Columbia \u00dcniversitesi ve AT&amp;T Bell Labs i\u015fbirli\u011fi ile ara\u015ft\u0131r\u0131lmaya ba\u015fland\u0131\u011f\u0131n\u0131, Temmuz 1994&#8217;de Trusted Information Systems&#8217;de \u00e7al\u0131\u015fan Wei XU (Plug and Play yani tak \u00e7al\u0131\u015ft\u0131r teknolojisini geli\u015ftiren ki\u015fi) bu ara\u015ft\u0131rmaya destek vererek \u00f6nemli katk\u0131 sa\u011flad\u0131\u011f\u0131n\u0131 g\u00f6r\u00fcyoruz. Daha sonra IETF taraf\u0131ndan standartla\u015ft\u0131r\u0131lm\u0131\u015ft\u0131r. Gelin IPSec k\u0131sa bir benzetme ile anlatal\u0131m. \u00d6rne\u011fin \u00e7ok de\u011ferli bir e\u015fya sizin ve al\u0131c\u0131 i\u00e7in e\u015fyan\u0131z var bunu \u0130stanbul&#8217;dan Ankara&#8217;ya g\u00f6dereceksiniz.\u00d6zel bir g\u00fcvenlik \u015firketi ile anla\u015f\u0131yorsunuz ve bu ta\u015f\u0131ma i\u015fini sizin i\u00e7in yap\u0131yorlar. Kap\u0131n\u0131za \u00f6zel kargo g\u00fcvenlik personeli geliyor. Kimlik bilgileri personelin size bildirilmi\u015f, bilgileri (kimlik kontrol\u00fc) kontrol ediyorsunuz, firma personeline paketinizi teslim ediyorsunuz, paket z\u0131rhl\u0131 kargo arac\u0131na koyuluyor. Ara\u00e7 kap\u0131s\u0131 \u015fifre ve anahtar ile kilitlendi. Kargonuz ara\u00e7 ile kar\u015f\u0131ya g\u00f6nderiliyor. Al\u0131c\u0131 paketin kendisine geldi\u011fini, sizden geldi\u011fini do\u011fruluyor. Al\u0131c\u0131 paketi kontrol ediyor. Paket g\u00fcvenli bir \u015fekilde korumal\u0131 bir \u015fekilde al\u0131c\u0131ya teslim edildi.<\/span><\/span><!--more--><\/p>\n<p align=\"JUSTIFY\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">\u0130\u015fte asl\u0131nda ger\u00e7ekte IPSec i<\/span><\/span><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"><span lang=\"tr-TR\">ki bilgisayar aras\u0131nda(host-to-host), iki g\u00fcvenlik kap\u0131s\u0131 aras\u0131nda(network-to-network), bir g\u00fcvenlik kap\u0131s\u0131 ve bir bilgisayar aras\u0131nda(network-to-host) sa\u011flanan ba\u011flant\u0131daki veri ak\u0131\u015f\u0131n\u0131 korumak i\u00e7in kullan\u0131l\u0131r. IPsec kriptografik g\u00fcvenlik servislerini kullanarak IP protokol\u00fc ile ger\u00e7ekle\u015ftirilen ba\u011flant\u0131lar\u0131 korumak i\u00e7in kullan\u0131l\u0131r. A\u011f seviyesinde do\u011frulama, veri kayna\u011f\u0131 do\u011frulama,veri b\u00fct\u00fcnl\u00fc\u011f\u00fc, \u015fifreleme ve replay sald\u0131r\u0131lar\u0131na kar\u015f\u0131 koruma g\u00f6revlerini \u00fcstlenir.<\/span><\/span><\/span><\/p>\n<p align=\"JUSTIFY\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">A\u011f katman\u0131nda \u00e7al\u0131\u015fan IPSec uygulamadan ba\u011f\u0131ms\u0131z olarak her veriyi \u015fifreler ve \u015fifre sonras\u0131 olu\u015fturdu\u011fu ba\u015fl\u0131k ile verinin internette rahatl\u0131kla yolculuk edebilmesini sa\u011flar. G\u00fcn\u00fcm\u00fczde VPN(Virtual Private Network &#8211; Sanal \u00d6zel A\u011f) IPSec ile kar\u0131\u015ft\u0131rlmaktad\u0131r. VPN iki birim vb. aras\u0131nda kurulan sanal bir a\u011fd\u0131r. IPsec ise VPN ba\u011flant\u0131lar\u0131na korumal\u0131k yaparak g\u00fcvenli\u011fini art\u0131rmaktad\u0131r. <\/span><\/span><\/p>\n<p align=\"JUSTIFY\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">IPSec a\u00e7\u0131k bir standart oldu\u011fundan dolay\u0131 bir\u00e7ok kimlik do\u011frulama(authentication) ve \u015fifreleme(encryption) algoritmas\u0131n\u0131 i\u00e7inde bar\u0131nd\u0131r\u0131r.<\/span><\/span><\/p>\n<p align=\"JUSTIFY\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">A\u015fa\u011f\u0131daki resimde IPSec Framework yap\u0131s\u0131n\u0131 ve bu yap\u0131y\u0131 olu\u015fturan bloklar\u0131 ve kullan\u0131lan algoritmalar\u0131 g\u00f6rmektesiniz.<\/span><\/span><\/p>\n<p align=\"JUSTIFY\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"466\" data-permalink=\"http:\/\/www.bilisimonline.net\/index.php\/2016\/06\/02\/ipsec-internet-protocol-security\/ipsec-framework\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/IPsec-framework.png?fit=635%2C404\" data-orig-size=\"635,404\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"IPsec framework\" data-image-description=\"&lt;p&gt;IPsec framework&lt;\/p&gt;\n\" data-image-caption=\"&lt;p&gt;IPsec framework&lt;\/p&gt;\n\" data-medium-file=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/IPsec-framework.png?fit=300%2C191\" data-large-file=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/IPsec-framework.png?fit=620%2C394\" tabindex=\"0\" role=\"button\" class=\"wp-image-466 size-full alignnone\" src=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/IPsec-framework.png?resize=620%2C394\" alt=\"IPsec framework\" width=\"620\" height=\"394\" srcset=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/IPsec-framework.png?w=635 635w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/IPsec-framework.png?resize=300%2C191 300w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/IPsec-framework.png?resize=100%2C64 100w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/IPsec-framework.png?resize=150%2C95 150w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/IPsec-framework.png?resize=200%2C127 200w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/IPsec-framework.png?resize=450%2C286 450w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/IPsec-framework.png?resize=600%2C382 600w\" sizes=\"(max-width: 620px) 100vw, 620px\" \/><\/p>\n<p><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">\u015eimde bu bloklar\u0131 ayr\u0131 ayr\u0131 inceleyerek IPSec protokol\u00fcn\u00fcn nas\u0131ll \u00e7al\u0131\u015ft\u0131\u011f\u0131n\u0131 g\u00fcvenli\u011fin nas\u0131l sa\u011fland\u0131\u011f\u0131n\u0131 g\u00f6relim.<\/span><\/span><\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"463\" data-permalink=\"http:\/\/www.bilisimonline.net\/index.php\/2016\/06\/02\/ipsec-internet-protocol-security\/confidentiality2\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/Confidentiality2.jpg?fit=380%2C213\" data-orig-size=\"380,213\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Confidentiality, G\u00fcvenlik\" data-image-description=\"&lt;p&gt;Confidentiality, Siber G\u00fcvenlik Ders Notlar\u0131&lt;\/p&gt;\n\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/Confidentiality2.jpg?fit=300%2C168\" data-large-file=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/Confidentiality2.jpg?fit=380%2C213\" tabindex=\"0\" role=\"button\" class=\"alignnone wp-image-463 size-full\" src=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/Confidentiality2.jpg?resize=380%2C213\" alt=\"Confidentiality2\" width=\"380\" height=\"213\" srcset=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/Confidentiality2.jpg?w=380 380w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/Confidentiality2.jpg?resize=300%2C168 300w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/Confidentiality2.jpg?resize=100%2C56 100w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/Confidentiality2.jpg?resize=150%2C84 150w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/Confidentiality2.jpg?resize=200%2C112 200w\" sizes=\"(max-width: 380px) 100vw, 380px\" \/><\/p>\n<p><strong><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Gizlilik<\/span><\/span><\/strong> <strong><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">(Confidentiality)<\/span><\/span><\/strong><\/p>\n<p align=\"JUSTIFY\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">IPSec \u015fifreleme metotlar\u0131n\u0131 kullanarak gizlili\u011fi sa\u011flar. G\u00fcvenli\u011fin derecesi \u015fifreleme algoritmas\u0131nda kullan\u0131lan anahtar\u0131n uzunlu\u011funa ba\u011fl\u0131d\u0131r. Anahtar ne kadar uzun olursa, \u015fifreyi k\u0131rmak o kadar zor olur ve g\u00fcvenlik a\u00e7\u0131\u011f\u0131 olu\u015fma riski ortadan kalkar. Anahtar uzunlu\u011fu k\u0131\u0131sa ise \u015fifrenin k\u0131r\u0131lmas\u0131 daha kolay olacakt\u0131r. A\u015fa\u011f\u0131da birbirinden farkl\u0131 algoritmalar\u0131n a\u00e7\u0131klamas\u0131 yap\u0131lm\u0131\u015ft\u0131r.<\/span><\/span><\/p>\n<p align=\"JUSTIFY\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"462\" data-permalink=\"http:\/\/www.bilisimonline.net\/index.php\/2016\/06\/02\/ipsec-internet-protocol-security\/confidentiality1\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/Confidentiality1.jpg?fit=640%2C427\" data-orig-size=\"640,427\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Confidentiality1\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/Confidentiality1.jpg?fit=300%2C200\" data-large-file=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/Confidentiality1.jpg?fit=620%2C414\" tabindex=\"0\" role=\"button\" class=\"alignnone wp-image-462\" src=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/Confidentiality1.jpg?resize=500%2C334\" alt=\"Confidentiality1\" width=\"500\" height=\"334\" srcset=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/Confidentiality1.jpg?resize=300%2C200 300w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/Confidentiality1.jpg?resize=100%2C67 100w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/Confidentiality1.jpg?resize=150%2C100 150w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/Confidentiality1.jpg?resize=200%2C133 200w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/Confidentiality1.jpg?resize=450%2C300 450w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/Confidentiality1.jpg?resize=600%2C400 600w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/Confidentiality1.jpg?w=640 640w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n<ul>\n<li style=\"text-align: justify;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Des \u2013 56 bit uzunlu\u011funda simetrik kriptolama tekni\u011fi kullanan bir sistemdir. Ayn\u0131 anahtarla \u015fifrelenen veri gene ayn\u0131 anahtarla a\u00e7\u0131labiliyorsa simetrik bir \u015fifreleme algoritmas\u0131 kullan\u0131l\u0131yor demektir.<\/span><\/span><\/li>\n<li><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">3Des \u2013 Des\u2019in farkl\u0131 bir \u00e7e\u015fididir. 3 tane birbirinden ba\u011f\u0131ms\u0131z 56 bitlik \u015fifreleme kullanarak Des\u2019e g\u00f6re daha kuvvetli bir g\u00fcvenlik sunar.<\/span><\/span><\/li>\n<li><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Aes \u2013 3Des ve Des\u2019e g\u00f6re daha g\u00fcvenli bir sistemdir. 128 bit, 192 bit ve 256 bit olmak \u00fczere \u00fc\u00e7 farkl\u0131 anahtar uzunlu\u011funa sahip olabilir.<\/span><\/span><\/li>\n<li><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Seal \u2013 1993 y\u0131l\u0131nda Philip Rogaway ve Don Coppersmith taraf\u0131ndan geli\u015ftirilmi\u015f, 160 bit anahtar uzunlu\u011funu kullanan bir sistemdir.<\/span><\/span><\/li>\n<\/ul>\n<p><strong><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">B\u00fct\u00fcnl\u00fck (Integrity)<\/span><\/span><\/strong><\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"464\" data-permalink=\"http:\/\/www.bilisimonline.net\/index.php\/2016\/06\/02\/ipsec-internet-protocol-security\/integrity\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/integrity.jpg?fit=800%2C412\" data-orig-size=\"800,412\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"integrity\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/integrity.jpg?fit=300%2C155\" data-large-file=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/integrity.jpg?fit=620%2C319\" tabindex=\"0\" role=\"button\" class=\"alignnone wp-image-464\" src=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/integrity.jpg?resize=600%2C309\" alt=\"integrity\" width=\"600\" height=\"309\" srcset=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/integrity.jpg?w=800 800w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/integrity.jpg?resize=300%2C155 300w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/integrity.jpg?resize=768%2C396 768w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/integrity.jpg?resize=100%2C52 100w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/integrity.jpg?resize=150%2C77 150w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/integrity.jpg?resize=200%2C103 200w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/integrity.jpg?resize=450%2C232 450w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/integrity.jpg?resize=600%2C309 600w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">IPSec<\/span><\/span> <span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">g\u00f6nderi<\/span><\/span><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">len<\/span><\/span><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> verinin varaca\u011f\u0131 noktaya de\u011fi\u015ftirilmeden ve manip\u00fcle edilmeden g\u00f6nderilmesini sa\u011flar. Bu fonksiyon hash algoritmalar\u0131 vas\u0131tas\u0131<\/span><\/span><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">yla yerine getirilir.<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">IPSec veri b\u00fct\u00fcnl\u00fc\u011f\u00fc algoritmalar\u0131 ile verinin <\/span><\/span><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">varaca\u011f\u0131 noktaya de\u011fi\u015ftirilmeden ve manip\u00fcle edilmeden <\/span><\/span><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">sorunsuz bir \u015fekilde g\u00f6nderilmesini sa\u011flar. HMAC (Hashed Message Authentication Codes &#8211; \u015eifrelenmi\u015f Mesaj Do\u011frulama Kodu) sahip oldu\u011fu &#8220;hash&#8221; de\u011feri yard\u0131m\u0131yla verinin b\u00fct\u00fcnl\u00fc\u011f\u00fc koruyan bir algoritmad\u0131r. Amac\u0131 verinin kriptolanmas\u0131n\u0131 sa\u011flamak de\u011fil, verinin yolda de\u011fi\u015ftirilmesini \u00f6nleyerek verinin do\u011frulu\u011fundan al\u0131c\u0131 taraf\u0131n emin olmas\u0131n\u0131 sa\u011flamakt\u0131r. G\u00f6nderici taraf\u0131nda veri \u015fifrelenir ve Hash algoritmas\u0131ndan ge\u00e7irilerek bir Hash de\u011feri \u00fcretilir. Al\u0131c\u0131 taraf\u0131nda ise Hash algoritmas\u0131nda tersten\u00a0 ge\u00e7irilerek \u00fcretilen Hash de\u011ferinin g\u00f6nderici taraf\u0131nda elde edilen de\u011ferle ayn\u0131 olup olmad\u0131\u011f\u0131na bak\u0131l\u0131r. De\u011fer ayn\u0131ysa verinin b\u00fct\u00fcnl\u00fc\u011f\u00fc sa\u011flanm\u0131\u015ft\u0131r, farkl\u0131ysa veri de\u011fi\u015fmi\u015ftir ve kullan\u0131lmaz.\u0130ki \u00e7e\u015fit HMAC algoritmas\u0131 vard\u0131r:<\/span><\/span><\/p>\n<ul>\n<li><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">HMAC \u2013 MD5 \u2013 128 bitlik \u015fifrelenmi\u015f veriyi kullan\u0131r. Algoritmadan \u00e7\u0131km\u0131\u015f hali gene 128 bitlik bir Hash de\u011feridir.<\/span><\/span><\/li>\n<li><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">HMAC \u2013 SHA1 \u2013 160 bit uzunlu\u011funda anahtarlama tekni\u011fi kullan\u0131r. Bu algoritma g\u00fcvenlik a\u00e7\u0131s\u0131ndan HMAC \u2013 MD5\u2019den daha g\u00fc\u00e7l\u00fcd\u00fcr. <\/span><\/span><\/li>\n<\/ul>\n<p><strong><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Kimlik Denetimi (Authentication)<\/span><\/span><\/strong><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Genellikle bir belgenin kimlik denetiminin sa\u011flanmas\u0131 imzalama y\u00f6ntemiyle olur. Elektronik cihazlarda ise say\u0131sal imza ad\u0131 verilen g\u00f6nderen cihaz\u0131n \u00f6zel \u015fifresini ta\u015f\u0131yan paketler yard\u0131m\u0131yla kimlik denetimi sa\u011flan\u0131r. IPSec kimlik denetimini sa\u011flamak i\u00e7in PSK ve RSA olmak \u00fczere iki farkl\u0131 algoritma kullan\u0131r.<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><strong><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">PSK<\/span><\/span><\/strong><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> \u2013 \u00d6n-payla\u015f\u0131ml\u0131 gizli anahtarlama metodu anlam\u0131na gelmektedir. Cihazlarda kimlik denetimini sa\u011flamak i\u00e7in belirlenmi\u015f olan bir say\u0131sal de\u011fer elle gereken cihazlara girilir. Her cihaz kar\u015f\u0131s\u0131ndaki cihaz\u0131n de\u011ferini \u00f6\u011frendikten sonra a\u011f g\u00fcvenli hale gelir ve veri aktar\u0131m\u0131 ba\u015flar. Girilen say\u0131sal de\u011fer cihaz\u0131n imzas\u0131 olarak kabul edilmi\u015f olur ve kimlik denetimi sa\u011flan\u0131r.<\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><strong><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">RSA<\/span><\/span><\/strong><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\"> \u2013 Asimetrik bir \u015fifreleme algoritmas\u0131d\u0131r. Simetrik \u015fifrelerdeki gibi tek anahtar kullan\u0131lmas\u0131n\u0131n yerine biri gizli di\u011feri a\u00e7\u0131k olmak \u00fczere iki anahtar kullan\u0131r. \u00d6zellikle \u00e7ok kullan\u0131c\u0131s\u0131 olan sistemlerde olduk\u00e7a ge\u00e7erlidir. Sistemin g\u00fcvenilirli\u011fi ve h\u0131z\u0131n\u0131 etkileyen en \u00f6nemli fakt\u00f6r kullan\u0131lan anahtar\u0131n uzunlu\u011fudur. <\/span><\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Kimlik denetimini sa\u011flamak i\u00e7in di\u011fer bir y\u00f6ntem de IKE (Internet Key Exchange \u2013 \u0130nternet \u015eifre De\u011fi\u015fimi) ad\u0131 verilen protokuld\u00fcr. IKE kimlik denetimini, kullan\u0131c\u0131 ad\u0131 ve \u015fifre, tek seferlik \u015fifre, say\u0131sal sertifikalar gibi \u00e7e\u015fitli y\u00f6ntemlerle ger\u00e7ekle\u015ftirir.<\/span><\/span><\/p>\n<p><strong><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">G\u00fcvenli Anahtar De\u011fi\u015fimi (Secure Key Exchange)<\/span><\/span><\/strong><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">IPSec cihazlar aras\u0131 a\u00e7\u0131k anahtar de\u011fi\u015fimini sa\u011flamak i\u00e7in Diffie-Helman ad\u0131 verilen algoritmalar\u0131 kullan\u0131r. Cihazlar aras\u0131ndaki \u015fifreleme ve \u015fifreyi \u00e7\u00f6zme i\u015flemlerini ger\u00e7ekle\u015ftirmek i\u00e7in en kolay y\u00f6ntem anahtar de\u011fi\u015fimini sa\u011flamakt\u0131r. Diffie-Helman, k\u0131saca DH algoritmalar\u0131 sayesinde g\u00fcvenli olmayan bir kanal \u00fczerinden veri aktar\u0131rken bile cihazlar aras\u0131ndaki anahtar de\u011fi\u015fimi sorunsuz bir \u015fekilde ger\u00e7ekle\u015ftirilebilir.<br \/>\nDH algoritmalar\u0131 DH 1, DH 2, DH 5 ve DH 7 olmak \u00fczere 4 farkl\u0131 \u015fekilde gruplanm\u0131\u015ft\u0131r. Temelde bu algoritmalar aras\u0131ndaki fark \u015fifreleme yaparken kullan\u0131lan bit say\u0131s\u0131d\u0131r.<\/span><\/span><\/p>\n<ul>\n<li><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">DH 1 768 bit, DH 2 1024 bit, DH 5 1536 bitlik anahtar kullan\u0131r. <\/span><\/span><\/li>\n<li><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">CISCO 3000 serisi cihazlar\u0131 DH 1-2-5\u2019i kullan\u0131rken, Des ve 3Des \u015fifreleme metotlar\u0131 DH 1 ve 2\u2019yi, AES metodu ise DH 2 ve 5\u2019i kullan\u0131r.<\/span><\/span><\/li>\n<\/ul>\n<p><strong><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">IPSec Protokolleri<\/span><\/span><\/strong><\/p>\n<p><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">IPSec protokolleri IPSec yap\u0131 blo\u011funda ilk s\u0131radad\u0131r. AH ve ESP olmak \u00fczere 2 \u00e7e\u015fittir.<\/span><\/span><\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"461\" data-permalink=\"http:\/\/www.bilisimonline.net\/index.php\/2016\/06\/02\/ipsec-internet-protocol-security\/ah-and-esp\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/AH-and-ESP.png?fit=1970%2C1080\" data-orig-size=\"1970,1080\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"AH and ESP\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/AH-and-ESP.png?fit=300%2C164\" data-large-file=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/AH-and-ESP.png?fit=620%2C340\" tabindex=\"0\" role=\"button\" class=\"alignnone wp-image-461 size-large\" src=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/AH-and-ESP-1024x561.png?resize=605%2C331\" alt=\"AH and ESP\" width=\"605\" height=\"331\" srcset=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/AH-and-ESP.png?resize=1024%2C561 1024w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/AH-and-ESP.png?resize=300%2C164 300w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/AH-and-ESP.png?resize=768%2C421 768w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/AH-and-ESP.png?resize=100%2C55 100w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/AH-and-ESP.png?resize=150%2C82 150w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/AH-and-ESP.png?resize=200%2C110 200w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/AH-and-ESP.png?resize=450%2C247 450w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/AH-and-ESP.png?resize=600%2C329 600w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/AH-and-ESP.png?resize=900%2C493 900w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/AH-and-ESP.png?w=1970 1970w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/AH-and-ESP.png?w=1240 1240w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/AH-and-ESP.png?w=1860 1860w\" sizes=\"(max-width: 605px) 100vw, 605px\" \/><\/p>\n<p><strong><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">AH (Authentication Header \u2013 Kimlik Denetimi Ba\u015fl\u0131\u011f\u0131) <\/span><\/span><\/strong><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">AH, veri b\u00fct\u00fcnl\u00fc\u011f\u00fc (integrity) ve veri kayna\u011f\u0131 kimlik denetimi sa\u011flar. AH, korunmas\u0131 istenen datan\u0131n i\u00e7ine g\u00f6m\u00fcl\u00fcr. ESP protokol\u00fcnden itibaren AH protokol\u00fc \u00f6nemini yitirmi\u015ftir.AH protokolu genellikle gizlilik gerekli olmad\u0131\u011f\u0131nda ya da izin verilmedi\u011finde kullan\u0131l\u0131r. \u0130letim s\u0131ras\u0131nda olu\u0131\u015fabilecek de\u011fi\u015fiklikleri engellemek, g\u00f6nderilen paketin b\u00fct\u00fcnl\u00fc\u011f\u00fcn\u00fc korumak i\u00e7in IP paketine s\u0131ra numaras\u0131 verilir. E\u011fer al\u0131c\u0131 taraf\u0131na paketler s\u0131ra numaras\u0131na uymayacak \u015fekilde ula\u015f\u0131rsa paketler kabul edilmez. Bununla birlikte AH gizlilik sa\u011flamad\u0131\u011f\u0131 i\u00e7in tek ba\u015f\u0131na kullan\u0131lmas\u0131 durumunda g\u00fcvenlik a\u00e7\u0131\u011f\u0131 olu\u015fturabilir.<\/span><\/span><\/p>\n<p><strong><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">ESP (Encapsulating Security Payload \u2013 Kaps\u00fcllenen G\u00fcvenlik Y\u00fck\u00fc)<\/span><\/span><\/strong><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">ESP; verinin \u015fifrelenmesi, kimlik denetiminden ge\u00e7irilmesi ve g\u00fcvenli hale getirilmesini sa\u011flar. Bir\u00e7ok IPSec uygulamalar\u0131 ESP\u2019i kullan\u0131r. <\/span><\/span><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">ESP protokolu gizlilik ve kimlik denetimini beraber sa\u011flayabilir. Bu protokol \u00f6ncelikli olarak AH taraf\u0131ndan s\u0131ra numaras\u0131 verilmi\u015f IP paketlerini belirlenmi\u015f algoritmalardan faydalanarak \u015fifrelemek ve hedefe ula\u015ft\u0131\u011f\u0131nda ayn\u0131 algoritmalar\u0131 kullanarak \u00e7\u00f6z\u00fcmlemektir. B\u00f6ylece AH taraf\u0131ndan olu\u015fabilecek g\u00fcvenlik a\u00e7\u0131\u011f\u0131 engellenmi\u015f olur. <\/span><\/span><\/p>\n<p><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">AH ve ESP protokolleri IP paketlerine iki farkl\u0131 \u015fekilde uygulanabilir.<\/span><\/span><\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"467\" data-permalink=\"http:\/\/www.bilisimonline.net\/index.php\/2016\/06\/02\/ipsec-internet-protocol-security\/transport-and-tunnel-mode\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/transport-and-tunnel-mode.png?fit=1942%2C1160\" data-orig-size=\"1942,1160\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"transport and tunnel mode\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/transport-and-tunnel-mode.png?fit=300%2C179\" data-large-file=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/transport-and-tunnel-mode.png?fit=620%2C371\" tabindex=\"0\" role=\"button\" class=\"wp-image-467 size-large alignnone\" src=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/transport-and-tunnel-mode.png?resize=605%2C362\" alt=\"transport and tunnel mode\" width=\"605\" height=\"362\" srcset=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/transport-and-tunnel-mode.png?resize=1024%2C612 1024w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/transport-and-tunnel-mode.png?resize=300%2C179 300w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/transport-and-tunnel-mode.png?resize=768%2C459 768w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/transport-and-tunnel-mode.png?resize=100%2C60 100w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/transport-and-tunnel-mode.png?resize=150%2C90 150w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/transport-and-tunnel-mode.png?resize=200%2C119 200w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/transport-and-tunnel-mode.png?resize=450%2C269 450w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/transport-and-tunnel-mode.png?resize=600%2C358 600w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/transport-and-tunnel-mode.png?resize=900%2C538 900w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/transport-and-tunnel-mode.png?w=1942 1942w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/transport-and-tunnel-mode.png?w=1240 1240w, https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/transport-and-tunnel-mode.png?w=1860 1860w\" sizes=\"(max-width: 605px) 100vw, 605px\" \/><\/p>\n<p><strong><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Transport Mode (Aktarma Modu)<\/span><\/span><\/strong><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Bu modda g\u00fcvenlik sadece OSI katmanlar\u0131ndan Transport katman\u0131 ve \u00fczerinde sa\u011flanan bir \u00f6zelliktir. Transport modu IP paketinin AH veya ESP ile korunmas\u0131n\u0131 sa\u011flar. Paketin y\u00fck b\u00f6l\u00fcm\u00fc \u00fczerinden koruma ger\u00e7ekle\u015firken, ger\u00e7ek IP adresinde de\u011fi\u015fiklik meydana gelmez. Ayn\u0131 yerel a\u011f i\u00e7erisinde bulunan cihazlar taraf\u0131ndan kullan\u0131labilir.<\/span><\/span><\/p>\n<p><strong><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Tunnel Mode (T\u00fcnel modu)<\/span><\/span><\/strong><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Bu modda g\u00fcvenlik b\u00fct\u00fcn IP paketi \u00fczerinden ger\u00e7ekle\u015ftirilir. Ger\u00e7ek IP paketi \u015fifrelenir ve ba\u015fka bir IP paketi yard\u0131m\u0131ya kaps\u00fclleme yap\u0131l\u0131r. Genel olarak t\u00fcnel modu veriler farkl\u0131 bir a\u011fdan ge\u00e7i\u015f yapaca\u011f\u0131 zaman kullan\u0131l\u0131r. T\u00fcnel modunda \u015fifreleme i\u015flemi veriler a\u011fdan \u00e7\u0131k\u0131\u015f yaparken a\u011f ge\u00e7idi (gateway) \u00fczerinde yap\u0131l\u0131r. \u0130\u00e7 a\u011flarda IPSec kullanmaya gerek yoktur.<\/span><\/span><\/p>\n<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"468\" data-permalink=\"http:\/\/www.bilisimonline.net\/index.php\/2016\/06\/02\/ipsec-internet-protocol-security\/tunnel-and-transport-mode\/\" data-orig-file=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/tunnel-and-transport-mode.gif?fit=450%2C227\" data-orig-size=\"450,227\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"tunnel and transport mode\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/tunnel-and-transport-mode.gif?fit=300%2C151\" data-large-file=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/tunnel-and-transport-mode.gif?fit=450%2C227\" tabindex=\"0\" role=\"button\" class=\"alignnone wp-image-468 size-full\" src=\"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/tunnel-and-transport-mode.gif?resize=450%2C227\" alt=\"tunnel and transport mode\" width=\"450\" height=\"227\" \/><\/p>\n<p><span style=\"font-family: Arial, sans-serif;\"><span style=\"font-size: small;\">Kaynak: <a href=\"http:\/\/bidb.itu.edu.tr\/seyir-defteri\">http:\/\/bidb.itu.edu.tr\/seyir-defteri<\/a>, <a href=\"https:\/\/tr.wikipedia.org\/wiki\/Ana_Sayfa\">https:\/\/tr.wikipedia.org\/wiki\/Ana_Sayfa<\/a><\/span><\/span><\/p>\n<p align=\"JUSTIFY\">\n","protected":false},"excerpt":{"rendered":"<p>Merhaba bu yaz\u0131m\u0131zda sizlere IPSec Nedir, nas\u0131l \u00e7al\u0131\u015f\u0131r\u0131 anlataca\u011f\u0131z. IPSec (Internet Protocol Security veya Internet Protokol\u00fc g\u00fcvenli\u011fi) isminden de anla\u015f\u0131laca\u011f\u0131 \u00fczere Internet Protokol\u00fc (IP) kullan\u0131lan ileti\u015fimlerde do\u011frulama ve \u015fifreleme kullanarak g\u00fcvenli\u011fini sa\u011flayan, IETF (Internet Engineering Task Force) taraf\u0131ndan geli\u015ftirilmi\u015f bir protokold\u00fcr. Biraz tarih\u00e7esini inceledi\u011fimizde Aral\u0131k 1993&#8217;de Yaz\u0131l\u0131m Ip \u015eifreleme Protokol\u00fc swIPe John IOANNIDIS ve tak\u0131m &#8230;<\/p>\n","protected":false},"author":1,"featured_media":466,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[74,30,19],"tags":[253,254,250,252,260,261,262,251,264,263,266,269,270,466,467,265,267,468,465,268,472,256,258,259,255,257,470,471,469],"class_list":["post-460","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ag-guvenlik","category-ag","category-siber-guvenlik","tag-3des","tag-aes","tag-ah","tag-des","tag-dh1","tag-dh2","tag-dh5","tag-esp","tag-internet-protocol-security","tag-ipsec","tag-ipsec-bilgi","tag-ipsec-block","tag-ipsec-framework","tag-ipsec-framework-yapisi","tag-ipsec-nasil-calisir","tag-ipsec-nedir","tag-ipsec-protokolu-nedir","tag-ipsec-vpn-nasil-yapilir","tag-ipsec-vpn-nedir","tag-ipsec-yapisi","tag-kimlik-denetimi","tag-md5","tag-psk","tag-rsa","tag-seal","tag-sha","tag-veri-butunlugu","tag-veri-dogrulama","tag-veri-guvenligi"],"jetpack_publicize_connections":[],"aioseo_notices":[],"views":3384,"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.bilisimonline.net\/wp-content\/uploads\/2016\/06\/IPsec-framework.png?fit=635%2C404","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7k56R-7q","jetpack-related-posts":[],"_links":{"self":[{"href":"http:\/\/www.bilisimonline.net\/index.php\/wp-json\/wp\/v2\/posts\/460"}],"collection":[{"href":"http:\/\/www.bilisimonline.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.bilisimonline.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.bilisimonline.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.bilisimonline.net\/index.php\/wp-json\/wp\/v2\/comments?post=460"}],"version-history":[{"count":5,"href":"http:\/\/www.bilisimonline.net\/index.php\/wp-json\/wp\/v2\/posts\/460\/revisions"}],"predecessor-version":[{"id":879,"href":"http:\/\/www.bilisimonline.net\/index.php\/wp-json\/wp\/v2\/posts\/460\/revisions\/879"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/www.bilisimonline.net\/index.php\/wp-json\/wp\/v2\/media\/466"}],"wp:attachment":[{"href":"http:\/\/www.bilisimonline.net\/index.php\/wp-json\/wp\/v2\/media?parent=460"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.bilisimonline.net\/index.php\/wp-json\/wp\/v2\/categories?post=460"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.bilisimonline.net\/index.php\/wp-json\/wp\/v2\/tags?post=460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}