Security Protocols

Posted on 2004-09-15
Last Modified: 2011-09-20
Hi all
Recently, We have developed a TCP/IP stack protocol(under C).Now, we want to develop a security protocol over this stack as all application can be run with security option.
What protocols can be candidated?which is simplest for implementation?
Question by:yamahdi

Accepted Solution

iwontleaveyou earned 63 total points
ID: 12063670
Ipsec is the best candidate but its not easy to setup as it require both the caller and the reciepent to have ipsec enabled.

then comes your secure ports like


Assisted Solution

jhilving earned 62 total points
ID: 12063744
Adding to previous comment check out:

Good Luck!

Featured Post

NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
f5 Persistence 14 62
New firewall implementation guidance 12 89
Cisco 3650 switch 7 45
how to determine subnet mask? 11 40
ADCs have gained traction within the last decade, largely due to increased demand for legacy load balancing appliances to handle more advanced application delivery requirements and improve application performance.
When you try to share a printer , you may receive one of the following error messages. Error message when you use the Add Printer Wizard to share a printer: Windows could not share your printer. Operation could not be completed (Error 0x000006…
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question