1. Internet Protocol Security<br />IP PACKETS HAVE NO INHERENT SECURITY – NO WAY TO VERIFY,<br />How to ensure that, the data has not been modified in transmit.<br />How to ensure that, the data has not been viewed by the third party.<br />How to ensure that, the data that you have received is from the right person (from the true sender).<br />What about, Non repudiation.<br />Hence,<br /> IPSec provides an automated solution for these three areas,<br />Authentication<br />Integrity<br />Confidentiality<br />Encryption<br />
2. Standard IP Packet:<br />First, data.<br />The data is encapsulated/wrapped by TCP Header, which determines the destinations application on the machine your sending to .<br />It determines for which application data is ment for. by sending port number of the application <br />Example: 80 for HTTP, 21 for FTP….<br />IP Header is encapsulated/wrapped on TCP Header.<br />IP Header determines where the data should go on the physical network.<br />It takes care of taking data from one computer to another computer on the network/ internet.<br />Once the data reaches destination first IP Header is removed, then TCP Header says where the data should go with the destination system and finally when it gets to that location TCP Header is also removed, the data is reassembled and delivered to the application.<br />NOW THE DIFFERENCE BETWEN STANDARD IP PACKET AND IPSEC PROTECTED PACKET IS THAT,<br />
3. IPSec Packet:<br />First, data<br />Data is encapsulated with TCP Header.<br />Then, IPSec Header is encapsulated<br />And now IP Header is encapsulated<br />IPSec is application independent because of which it enables<br />authentication, integrity, confidentiality, encryption into the system.<br />
4. How to implement IPSec enabled communication?<br />IPSec can be implemented through policies that enforce a set of packet filters on inbound or outbound traffic.<br />Filters set to or (with the help of filters you can):<br />Block<br />Permit<br />Negotiate security (encrypt)<br />IPSec policies used to:<br />Protect contents of IP packet.<br />Defends against network hacks.<br /> 1.<br />IPSec can be enabled through “IP Sec policy editing tool” -<br /> open this editing tool via “mmc”<br /> Go to run > type “mmc”> file>add/remove snap in > Add > select “IPSec policy management” and click “Add”> local computer > finish > ok.<br /> And you can now see three policies at the right side of the window “client (respond only)”, “server(request security)”, “secure server(require security)”.<br />To implement any of the policy , right click policy and click on ” Assign “.The policy will be enabled.<br />To implement IPSec policies on active directory users or on organizational unit.<br /> Right click organizational unit>properties>Group policy> ” new ” give a name and ” edit ” ><br />computer management > windows > security settings > IP Security policy on active directory and you will see three preloaded filters/policies.<br />You can assign or unassign any policy.<br />
5. Configuring IPSec policies<br />Default policies:<br />Client (Respond only):System won’t use IPSec unless requested.<br />Server (Request security):Try to initiate IPSec communication whenever possible.<br />Secure Server(Require Security):Disallow any communication that does not use IPSec.<br />Can only assign one policy at a time.<br /> <br />2.<br />IPSec works under IP Layer of TCP/IP model.<br />Type ” secpol.msc ” in run to open IP Security policy console.<br />Need to set rules (must be defined) : what type of packets must be blocked or encrypt or filtered or.. when packets communicate from ipaddress 192.168.1.1 192.168.1.10 <br />Policy Rules<br />Tell IP sec how to behave(encrypt certain communication, sign other communication, etc.)<br />A rule is defined by the combination of IPSec actions + IPSec FiltersFilter: only activate the rule if traffic comes from ip address 192.168.2.23 and uses FTP.<br />Action: encrypt the traffic<br />
6. Go to IP security management on local computer > right click ” Manage IP Filter list and filter actions “ > under “ manage filter actions ” > click ” Add ” > welcome screen > next > give name as ” block ” and next> select ” block” and next> “finish” > Now go to the Assigned policy > properties > under rules, double click on ” ALL ICMP Traffic ” > under filter action , select ” Block ” > ” Apply ” and ” Ok “.<br />the above rules is If the filter match’s icmp traffic or ping traffic the action is to block the traffic.<br />3.<br />Above is for default policies and if we want to set our own policy rule , example<br />when ever system 23 communicate with system 100 vice-versa their communication must be encrypted(secure).<br /> <br />IPSec policy Example:<br />Two systems: 192.168.2.23 and .100<br />Filter: Trigger rule when traffic to .23, over any port.<br />Action : Encrypt data.<br />Authentication: pre shared key – bosco<br />Create filters and actions, then build the rules into the policies at both the machines.<br />
7. Steps:<br /><ul><li>start > run > secpol.msc >
8. First, we are going to create a new filter,
9. Rightclick on IP Security policies on local computer > Manage IP Filter lists and filter actions, > under Manage IP Filters click ” Add ” > Add > source address: My ip address, Destination address: a specific ip address:192.168.2.23 , ok > under protocol, select ANY>under description, traffic to 23 and click on ok > ok >
10. Then , we need to create an action,
11. Under Manage filter actions, click ” Add ” > Select ” Negotiate Security “ , click on ” Add ” and select ” Integrity and encryption ” (data will be encrypted and verified as authentic and unmodified). > ok > ok > close.
12. Now we need to create a new ip security policy that will use a rule that will assemble both filter and action that we just created(defined).
13. Right click on ” IP Security policies on local computers ” > select ” create IP Security policy ” > a welcome wizard opens, click next > Name: traffic to computer 23, next > uncheck ” activate default response rule “, next > finish</li></li></ul><li><ul><li>A dialog box containing rules & general will open immidiately.Notic that: the ip filter list(dynamic) is unchecked because we said that we created a policy rule. so here you need to attach filter and action you have created. to do this ,
14. click on ” Add ” > under ip filter list, select the ip filter u created and go to > Filter Action, select new filter action u created for encryption. and go to > Authentication method (authentication methods specify how trust is establised between the computers. These authentication methods are offered and accepted when negotiating security with another computer) , click ” edit ” > select use this string(preshared) :type ” bosco “ and click ” OK ” > “apply” , ”Ok” > “Ok” > “OK”.
15. This new Policy is published on the right side window, Eg: traffic to computer 23
16. Right click policy ” traffic to computer 23 ” >”Assign”
17. now after assigning , I have to go to the other computer ( 192.168.2.100) and reverse the process, I have to create a rule which gonna be called traffic to .100 and configure it exactly in the same way that you did here at 192.168.2.23 using same preshared key.
18. Test by pinging 192,168.2.23 and .100 at each other computer.</li></ul>This is how you can configure your computers to exchange a secure communication within and between computers.<br />