1.3 Supported Protocols

At the heart of networking are the security protocols. Different protocols are used to authenticate the identity of the participants, to structure and transmit the data over the network, and to encrypt and decrypt the data. Corente Cloud Services Exchange are built on several key protocols that are widely accepted as standards for secure networking.

The most significant of these is the Internet Protocol Security (IPSec) standard. IPSec provides a protocol framework for the secure, authenticated transmission of data between systems. It has been widely examined in the cryptographic community and is believed to be cryptographically sound. IPSec provides the framework for most VPN architectures deployed today.

Corente Cloud Services Exchange employs IPSec as the core protocol for data transport. While the protocol permits a wide range of configuration options, Corente Cloud Services Exchange constrains the configuration of the protocol to the choices that offer the highest known security. This greatly simplifies configuration of the secure network and ensures that insecure configurations cannot be created. The following IPSec options are used by Corente Cloud Services Exchange:

  • ESP (Encapsulating Security Payload)

  • Tunnel Mode

  • 192-bit AES encryption

  • 1024-bit Public/Private Keys

  • SHA-2

  • Deflate

Where protocol standards do not exist or are incomplete, Corente Cloud Services Exchange employs proprietary protocols. These include a control and monitoring protocol that allows secure networking devices to be centrally managed, protocols for tunneled transport of packets via TCP and UDP protocols, and protocols for the management and distribution of keying and authentication information.