SlideShare a Scribd company logo
1 of 11
Internet Protocol(IP)
 InternetProtocol(IP):Itisthemethodorprotocolbywhichdatais
sentfromonecomputertoanotherontheInternet.
OriginalversionoftheInternetProtocolthatwasfirstdesignedin 1983.
Security:“Thequalityorstateof being secure—to be free
fromdanger”.
IPSec protectsallthe trafficoverthe network.
What is IP Security
The IP security (IPSec) is an Internet Engineering Task Force (IETF) standard
suite of protocols between 2 communication points across the IP network
that provide data authentication, integrity, and confidentiality.
It also defines the encrypted, decrypted and authenticated packets.
Ip Security Provide
Confidentiality: By encrypting our data, nobody except the sender and receiver
will be able to read our data.
Integrity: We want to make sure that nobody changes the data in our packets. By
calculating a hash value, the sender and receiver will be able to check if changes
have been made to the packet.
Authentication: The sender and receiver will authenticate each other to make
sure that we are really talking with the device we intend to.
Anti-replay: Even if a packet is encrypted and authenticated, an attacker could
try to capture these packets and send them again. By using sequence numbers,
IPsec will not transmit any duplicate packets.
What is IP Security
 InternetProtocolSecurity(IPSec):Itissetsofprotocolsthat allowsecurecommunication
betweentwo computerover an unsecurednetwork.
 IPSechas twogoal:
 ToprotectIPpackets
 Providing defenseagainst network attack.
Uses of IP Security
IPsec can be used to do the following things:
To encrypt application layer data.
To provide security for routers sending routing data across the public
internet.
To provide authentication without encryption, like to authenticate that
the data originates from a known sender.
IPSec securenetworkTrafficbyusing
Encryption
Decryption
Data signing(trustedsource)
Encryption Technologies
There are two encryption modes available for IPsec. Both modes have their own
uses and should be used with caution depending upon the solution.
Tunnel Mode
This encrypts both the payload and the header. IPsec in tunnel mode is used when
the destination of the packet is different than the security termination point. The
most common use of this mode is between gateways or from end station to
gateway. The gateway serves as a proxy for the hosts. So when the origin of the
packets differs from the device that is providing security, tunnel mode is used.
Transport Mode
In this encryption mode, only the data portion of each packet is encrypted. This
mode is applicable between end stations or between end station and gateway.
Working of IP Security
The host checks if the packet should be transmitted using IPsec or not. These
packet traffic starts the security policy for themselves. This is done when the
system sending the packet apply an appropriate encryption. The incoming
packets are also checked by the host that they are encrypted properly or not.
Then the IKE Phase 1 starts in which the 2 hosts( using IPsec ) authenticate
themselves to each other to start a secure channel. It has 2 modes. The Main
mode which provides the greater security and the Aggressive mode which
enables the host to establish an IPsec circuit more quickly.
Working of IP Security
The channel created in the last step is then used to securely transfer the way the
IP circuit will encrypt data across the IP circuit.
Now, the IKE Phase 2 is conducted over the secure channel in which the two
hosts transfer the type of cryptographic algorithms to use on the session and
agreeing on secret keying material to be used with those algorithms.
Then the data is exchanged across the newly created IPsec encrypted tunnel.
These packets are encrypted and decrypted by the hosts using IPsec SAs.
When the communication between the hosts is completed or the session times out
then the IPsec tunnel is terminated by discarding the keys by both the hosts.
IPSecpolicieswork
Asecuritypolicyisasetofrulesthatdefinenetwork trafficattheIPlayer.
 IPSec protectsyour privatenetworkfrom Internet attacksthrough end-to-endsecurity.
 IPSec policiesmust be carefullydesigned,configured, coordinatedand managed toensure
thatIPSec communicationis successful.
ComponentofIPSec
IPSecComponents:
IPSec containsthefollowingelements:
 Encapsulating Security(ESP):Provides confidentiality, authentication,andintegrity.
 AuthenticationHeader(AH):Provides authenticationand integrity.Itdoesnotprovide
encryption.
 InternetKeyExchange(IKE):Provideskeymanagement and SecurityAssociation
(SA) management.

More Related Content

Similar to Ip Security.pptx

Define tunneling in the VPN environment and explain the difference bet.docx
Define tunneling in the VPN environment and explain the difference bet.docxDefine tunneling in the VPN environment and explain the difference bet.docx
Define tunneling in the VPN environment and explain the difference bet.docx
earleanp
 
college assignment on Applications of ipsec
college assignment on Applications of ipsec college assignment on Applications of ipsec
college assignment on Applications of ipsec
bigchill29
 

Similar to Ip Security.pptx (20)

Cn36539543
Cn36539543Cn36539543
Cn36539543
 
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
 
IP Security
IP SecurityIP Security
IP Security
 
Define tunneling in the VPN environment and explain the difference bet.docx
Define tunneling in the VPN environment and explain the difference bet.docxDefine tunneling in the VPN environment and explain the difference bet.docx
Define tunneling in the VPN environment and explain the difference bet.docx
 
Network security
Network securityNetwork security
Network security
 
Lecture14..pdf
Lecture14..pdfLecture14..pdf
Lecture14..pdf
 
Ip security
Ip security Ip security
Ip security
 
IP Security
IP SecurityIP Security
IP Security
 
IPSec VPN tunnel
IPSec VPN tunnelIPSec VPN tunnel
IPSec VPN tunnel
 
Cyber security
Cyber securityCyber security
Cyber security
 
Internet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography SystemInternet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography System
 
Design methodology for ip secured tunel based embedded platform for aaa server
Design methodology for ip secured tunel based embedded platform for aaa serverDesign methodology for ip secured tunel based embedded platform for aaa server
Design methodology for ip secured tunel based embedded platform for aaa server
 
IP security and VPN presentation
IP security and VPN presentation IP security and VPN presentation
IP security and VPN presentation
 
college assignment on Applications of ipsec
college assignment on Applications of ipsec college assignment on Applications of ipsec
college assignment on Applications of ipsec
 
I psec cisco
I psec ciscoI psec cisco
I psec cisco
 
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
 
Lec 9.pptx
Lec 9.pptxLec 9.pptx
Lec 9.pptx
 
Ipsecurity
IpsecurityIpsecurity
Ipsecurity
 
IPsec for IMS
IPsec for IMSIPsec for IMS
IPsec for IMS
 
ESP.ppt
ESP.pptESP.ppt
ESP.ppt
 

Recently uploaded

Recently uploaded (20)

Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 

Ip Security.pptx

  • 1. Internet Protocol(IP)  InternetProtocol(IP):Itisthemethodorprotocolbywhichdatais sentfromonecomputertoanotherontheInternet. OriginalversionoftheInternetProtocolthatwasfirstdesignedin 1983. Security:“Thequalityorstateof being secure—to be free fromdanger”. IPSec protectsallthe trafficoverthe network.
  • 2. What is IP Security The IP security (IPSec) is an Internet Engineering Task Force (IETF) standard suite of protocols between 2 communication points across the IP network that provide data authentication, integrity, and confidentiality. It also defines the encrypted, decrypted and authenticated packets.
  • 3. Ip Security Provide Confidentiality: By encrypting our data, nobody except the sender and receiver will be able to read our data. Integrity: We want to make sure that nobody changes the data in our packets. By calculating a hash value, the sender and receiver will be able to check if changes have been made to the packet. Authentication: The sender and receiver will authenticate each other to make sure that we are really talking with the device we intend to. Anti-replay: Even if a packet is encrypted and authenticated, an attacker could try to capture these packets and send them again. By using sequence numbers, IPsec will not transmit any duplicate packets.
  • 4. What is IP Security  InternetProtocolSecurity(IPSec):Itissetsofprotocolsthat allowsecurecommunication betweentwo computerover an unsecurednetwork.  IPSechas twogoal:  ToprotectIPpackets  Providing defenseagainst network attack.
  • 5. Uses of IP Security IPsec can be used to do the following things: To encrypt application layer data. To provide security for routers sending routing data across the public internet. To provide authentication without encryption, like to authenticate that the data originates from a known sender.
  • 7. Encryption Technologies There are two encryption modes available for IPsec. Both modes have their own uses and should be used with caution depending upon the solution. Tunnel Mode This encrypts both the payload and the header. IPsec in tunnel mode is used when the destination of the packet is different than the security termination point. The most common use of this mode is between gateways or from end station to gateway. The gateway serves as a proxy for the hosts. So when the origin of the packets differs from the device that is providing security, tunnel mode is used. Transport Mode In this encryption mode, only the data portion of each packet is encrypted. This mode is applicable between end stations or between end station and gateway.
  • 8. Working of IP Security The host checks if the packet should be transmitted using IPsec or not. These packet traffic starts the security policy for themselves. This is done when the system sending the packet apply an appropriate encryption. The incoming packets are also checked by the host that they are encrypted properly or not. Then the IKE Phase 1 starts in which the 2 hosts( using IPsec ) authenticate themselves to each other to start a secure channel. It has 2 modes. The Main mode which provides the greater security and the Aggressive mode which enables the host to establish an IPsec circuit more quickly.
  • 9. Working of IP Security The channel created in the last step is then used to securely transfer the way the IP circuit will encrypt data across the IP circuit. Now, the IKE Phase 2 is conducted over the secure channel in which the two hosts transfer the type of cryptographic algorithms to use on the session and agreeing on secret keying material to be used with those algorithms. Then the data is exchanged across the newly created IPsec encrypted tunnel. These packets are encrypted and decrypted by the hosts using IPsec SAs. When the communication between the hosts is completed or the session times out then the IPsec tunnel is terminated by discarding the keys by both the hosts.
  • 10. IPSecpolicieswork Asecuritypolicyisasetofrulesthatdefinenetwork trafficattheIPlayer.  IPSec protectsyour privatenetworkfrom Internet attacksthrough end-to-endsecurity.  IPSec policiesmust be carefullydesigned,configured, coordinatedand managed toensure thatIPSec communicationis successful.
  • 11. ComponentofIPSec IPSecComponents: IPSec containsthefollowingelements:  Encapsulating Security(ESP):Provides confidentiality, authentication,andintegrity.  AuthenticationHeader(AH):Provides authenticationand integrity.Itdoesnotprovide encryption.  InternetKeyExchange(IKE):Provideskeymanagement and SecurityAssociation (SA) management.