This table lists those applications that are used for network security. For more details of any module, click on its link in the table.
All of these modules are part of the HCC MISRA-compliant TCP/IP stack, as shown in the Networking Overview diagram, and designed specifically for use with it.
|IPsec and IKE||IPsec is the Security Architecture for IP protocol suite. Internet Key Exchange (IKEv2) is used by IPsec to set up Security Associations.|
|TLS/DTLS||Transport Layer Security (TLS) or Datagram Transport Layer Security (DTLS) is a highly optimized software module designed to provide secure network communications for embedded devices.|
|TLS 1.3||TLS 1.3 is the latest version of TLS, replacing TLS 1.2 which is used in the above module.|
|EAP||Extensible Authentication Protocol (EAP), designed to support secure connections for embedded devices.|
|EST-CoAP||Enrollment over Secure Transport (EST) is used for authenticated/authorized endpoint certificate enrollment. EST-CoAP uses the Constrained Application Protocol (CoAP) instead of HTTP for some Internet of Things (IoT) devices.|
|SSH||Secure SHell (SSH) server creates a secure socket connection that can be used for executing menu commands or for tunneling data between the clients and servers of other applications.|
|NAT||Network Address Translation (NAT) allows an organization to set up a network using private addresses, but still allowing its members to communicate over the public Internet.|
|MACsec||MACsec provides security on point-to-point Ethernet links or shared Ethernet networks, giving confidentiality, integrity, and authenticity of user data.|