SlideShare a Scribd company logo
1 of 41
IPSEC
Crypto Group presents:
 Definition
Why IPSec?
 Goals of IPSec
Introduction
 Definition
Internet Protocol Security (IPSec)
is a Protocol suite for secure
Internet Protocol (IP) communications
by authenticating and encrypting
each IP packet of communication
session.
IP is not secure..!
IP Protocol was designed in the late
70’s to early 80’s.
 Part of DARPA Internet Project
 Very Small Network
 All hosts are known
 So are the users
 Therefore security was not an issue
Why IPsec … ?
 Security Issues in IP
 Fundamental Issue
Networks are not fully Secure (and
never will be)
 DOS Attacks, Replay Attacks and Spying
etc.
 IP causes
 Source Spoofing
 Replay Packets
 No data Integrity or Confidentiality
Why IPsec … ? (Cont..)
 Authentication
 To verify sources of IP packets
 To prevent Replaying of Old Packets
 To protect Integrity and/or
Confidentiality of Packets
 Data Integrity/ Data Encryption
Goals of IPsec
 Wei Xu started in July 1994 the research on IP
Security, enhanced the IP protocols, developed
the IPSec product.
 The assembly software encryption was unable to
support even aT1 (1.544MBps) speed.
 Wei further developed an automated device
driver, known as plug-and-play.
 After achieving the throughput higher than a
T1s, in December 1994, he finally made the
commercial product, that was released as
Gauntlet firewalll
History of IPsec
History (cont..)
 In December 1993, Another IP Encapsulating
Security Payload (ESP) was researched at the
Naval Research Laboratory as DARPA project
 ESP was derived from the US Department of
Defense SP3D protocol.
 The SecurityAuthentication Header (AH) is
derived from previous IETF standard.
 In 1995,The IPsec working group in the IETF
was started to create Protocols.
 IETF : Internet EngineeringTask Force
9
Secure
Insecure
IPsec Security Model
Router Router
Transport Mode
Tunnel Mode
IPsec Architecture
 Transport Mode
Transport Mode is used between end-stations
supporting IPSec or between an end-station and
a gateway, if the gateway is being treated as
a host
 Tunnel Mode
Tunnel mode is used to encrypt traffic between
secure IPSec gateways and it is also used to
connect an end-station running IPSec Software.
Modes of IPsec
Modes of IPsec (Diagram)
IP header
IP header
IP header
TCP header
TCP header
TCP header
data
data
data
IPSec header
IPSec header IP header
Original
Transport
mode
Tunnel
mode
Modes of IPsec (Diagram cont..)
PROTOCOLS
IPSec is broken into multiple protocols.
These are:
 Authentication Header (AH)
 Encapsulated Security Payload (ESP)
 Internet Key Exchange (IKE)
 IP Payload Compression
Protocols
Authentication header is defined as:
Authentication Header (AH)
 Provides source authentication
 Protects against source spoofing
 Provides data integrity
 Protects against replay attacks
 Use monotonically increasing sequence
numbers
 Protects against denial of service
attacks
 NO protection for confidentiality!
Authentication Header (Cont..)
The following AH packet diagram shows how an
AH packet is constructed and interpreted.
Authentication Header (Cont..)
 User and application transparent
 Authentication
 Integrity checking
 Anti-replay
 Protects entire packet
Advantages of Authentication Header
 No confidentiality
 Unable to use NATs or proxies
 Only works with TCP/IP
Disadvantages of Authentication Header
ESP is a member of the IPsec protocol suite. In
IPsec it provides origin authenticity, integrity
and confidentiality protection of packets.
Encapsulating Security Payload (ESP)
The following ESP packet diagram show how an
ESP packet is constructed and interpreted.
ESP (Cont..)
 Does not protect entire packet
 May not work with NATs or proxies
 Only works with TCP/IP
Disadvantages of ESP
 User and application
 transparent
 Authentication
 Integrity checking
 Confidentiality
 Anti-replay
Advantages of ESP
 Used for compression
 Can be specified as part of the
IPSec policy
 Will not cover!
IP Payload Compression
Internet Key Exchange(IKE)
 The internet key exchange is a protocol to set
up a security association in the IPsec
protocol.
 Before secured data can be exchanged, a
security agreement is established between
two computers. In this security
agreement(SA) both peers agree on how to
exchange and protect information.
IKE Modes
The IKE (Internet Key Exchange) of
IPsec is of two phases:
1) IKE phase 1
2) IKE phase 2
IPSec Phases
IKE Phase 1 Diagram
IKE phase 2 does the following things:
 Negotiates IPsec SA parameters
protected by an existing IKE SA.
 Establishes Ipsec security
associations.
 Periodically negotiates IPsec SAs to
ensure security.
IKE Phase 2
IKE Phase 2 Diagram
Benefits of IKE
 Automatic negotiation.
 Authentication.
 Anti replay services.
 Certification authority.
 Authentication
 Integrity
 Confidentiality
IPSec Features
 IPsec policy is a set of rules that governs
when and how Windows uses IPsec protocol to
secure the communications.
 The IPsec policy interacts directly with the
Ipsec driver.
 IPsec consists of some basic elements which
includes:
 IP filter list
 Individual IP filters
 Filter actions
A brief description is as follows:
IPSec Policy
 IP filter list contains the IP packets
on which the action was applied.
 Individual IP filters tells windows
that on which IP packets actions should
be performed.
 Filter action is to secure the IP
packets.
IPSec Policy (Cont..)
The IPsec policy also requires some
info about the network which includes:
 Security method to use
 Connection type
 Tunnel settings
IPSec Policy (Cont..)
 Security methods – which security
algorithms to use for authentication and
key exchanges.
 Connection type – policy applied to
remote access connections, LANs or all
network connections.
 Tunnel settings – IPsec use over a
virtual private network.
IPSec Policy (Cont..)
 IPsec policies can be created or
edited.
 In windows, 3 default policies are
stored which are:
 Client policy
 Server policy
 Secure server policy
IPSec Policy (Cont..)
 IPsec policy to block PING traffic.
 IPsec policy configuration through
GPO.
IPSec Policy Examples
References:
 https://en.wikipedia.org/wiki/IPsec
 http://www.webopedia.com/TERM/I/IPsec.ht
ml
 http://www.unixwiz.net/techtips/iguide-
ipsec.html
I psecurity

More Related Content

What's hot

IPSec VPN Tutorial Part1
IPSec VPN Tutorial Part1IPSec VPN Tutorial Part1
IPSec VPN Tutorial Part1Abdallah Abuouf
 
college assignment on Applications of ipsec
college assignment on Applications of ipsec college assignment on Applications of ipsec
college assignment on Applications of ipsec bigchill29
 
MIT EmTech TR35 India 2011
MIT EmTech TR35 India 2011MIT EmTech TR35 India 2011
MIT EmTech TR35 India 2011manav416
 
Ipsec (network security)
Ipsec (network security)Ipsec (network security)
Ipsec (network security)AhmadRahmanian1
 
Secure containers for trustworthy cloud services: business opportunities
 Secure containers for trustworthy cloud services: business opportunities Secure containers for trustworthy cloud services: business opportunities
Secure containers for trustworthy cloud services: business opportunitiesATMOSPHERE .
 
IS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email SecurityIS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email SecuritySarthak Patel
 
Internet Key Exchange (ikev2) Protocol
Internet Key Exchange (ikev2) ProtocolInternet Key Exchange (ikev2) Protocol
Internet Key Exchange (ikev2) ProtocolNetwax Lab
 
Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Mohamed Loey
 

What's hot (19)

IPSec VPN Tutorial Part1
IPSec VPN Tutorial Part1IPSec VPN Tutorial Part1
IPSec VPN Tutorial Part1
 
IP Security
IP SecurityIP Security
IP Security
 
IPsec vpn
IPsec vpnIPsec vpn
IPsec vpn
 
college assignment on Applications of ipsec
college assignment on Applications of ipsec college assignment on Applications of ipsec
college assignment on Applications of ipsec
 
Ipsec 2
Ipsec 2Ipsec 2
Ipsec 2
 
MIT EmTech TR35 India 2011
MIT EmTech TR35 India 2011MIT EmTech TR35 India 2011
MIT EmTech TR35 India 2011
 
Ipsec (network security)
Ipsec (network security)Ipsec (network security)
Ipsec (network security)
 
Ip security
Ip securityIp security
Ip security
 
Secure containers for trustworthy cloud services: business opportunities
 Secure containers for trustworthy cloud services: business opportunities Secure containers for trustworthy cloud services: business opportunities
Secure containers for trustworthy cloud services: business opportunities
 
IS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email SecurityIS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email Security
 
IP Security
IP SecurityIP Security
IP Security
 
IPsec
IPsecIPsec
IPsec
 
IPSec VPN tunnel
IPSec VPN tunnelIPSec VPN tunnel
IPSec VPN tunnel
 
Ipsec
IpsecIpsec
Ipsec
 
Ike
IkeIke
Ike
 
Ip Sec
Ip SecIp Sec
Ip Sec
 
Internet Key Exchange (ikev2) Protocol
Internet Key Exchange (ikev2) ProtocolInternet Key Exchange (ikev2) Protocol
Internet Key Exchange (ikev2) Protocol
 
Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1Computer Security - CCNA Security - Lecture 1
Computer Security - CCNA Security - Lecture 1
 
Iuwne10 S04 L05
Iuwne10 S04 L05Iuwne10 S04 L05
Iuwne10 S04 L05
 

Similar to I psecurity

IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfsolimankellymattwe60
 
Which of the following can be used to authenticate and encrypt IP (Int.docx
Which of the following can be used to authenticate and encrypt IP (Int.docxWhich of the following can be used to authenticate and encrypt IP (Int.docx
Which of the following can be used to authenticate and encrypt IP (Int.docxjbarbara1
 
The Security layer
The Security layerThe Security layer
The Security layerSwetha S
 
IP Security and its Components
IP Security and its ComponentsIP Security and its Components
IP Security and its ComponentsMohibullah Saail
 
Crypto map based IPsec VPN fundamentals - negotiation and configuration
Crypto map based IPsec VPN fundamentals - negotiation and configurationCrypto map based IPsec VPN fundamentals - negotiation and configuration
Crypto map based IPsec VPN fundamentals - negotiation and configurationdborsan
 
Working Survey of Authentication Header and Encapsulating Security Payload
Working Survey of Authentication Header and Encapsulating Security PayloadWorking Survey of Authentication Header and Encapsulating Security Payload
Working Survey of Authentication Header and Encapsulating Security Payloadijtsrd
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network securityPriyadharshiniVS
 
Web security
Web securityWeb security
Web securityLayla Tk
 

Similar to I psecurity (20)

VPN presentation - moeshesh
VPN presentation - moesheshVPN presentation - moeshesh
VPN presentation - moeshesh
 
Ip security
Ip security Ip security
Ip security
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
 
Network IP Security.pdf
Network IP Security.pdfNetwork IP Security.pdf
Network IP Security.pdf
 
Which of the following can be used to authenticate and encrypt IP (Int.docx
Which of the following can be used to authenticate and encrypt IP (Int.docxWhich of the following can be used to authenticate and encrypt IP (Int.docx
Which of the following can be used to authenticate and encrypt IP (Int.docx
 
Unit 6
Unit 6Unit 6
Unit 6
 
I psec
I psecI psec
I psec
 
The Security layer
The Security layerThe Security layer
The Security layer
 
Lecture14..pdf
Lecture14..pdfLecture14..pdf
Lecture14..pdf
 
IP Security and its Components
IP Security and its ComponentsIP Security and its Components
IP Security and its Components
 
crypto.pptx
crypto.pptxcrypto.pptx
crypto.pptx
 
crypto.pptx
crypto.pptxcrypto.pptx
crypto.pptx
 
IPSec
IPSecIPSec
IPSec
 
Crypto map based IPsec VPN fundamentals - negotiation and configuration
Crypto map based IPsec VPN fundamentals - negotiation and configurationCrypto map based IPsec VPN fundamentals - negotiation and configuration
Crypto map based IPsec VPN fundamentals - negotiation and configuration
 
Working Survey of Authentication Header and Encapsulating Security Payload
Working Survey of Authentication Header and Encapsulating Security PayloadWorking Survey of Authentication Header and Encapsulating Security Payload
Working Survey of Authentication Header and Encapsulating Security Payload
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Web security
Web securityWeb security
Web security
 
Ip security
Ip security Ip security
Ip security
 
Unit 5
Unit 5Unit 5
Unit 5
 
IPSec and VPN
IPSec and VPNIPSec and VPN
IPSec and VPN
 

Recently uploaded

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 

I psecurity

  • 2.  Definition Why IPSec?  Goals of IPSec Introduction
  • 3.  Definition Internet Protocol Security (IPSec) is a Protocol suite for secure Internet Protocol (IP) communications by authenticating and encrypting each IP packet of communication session.
  • 4. IP is not secure..! IP Protocol was designed in the late 70’s to early 80’s.  Part of DARPA Internet Project  Very Small Network  All hosts are known  So are the users  Therefore security was not an issue Why IPsec … ?
  • 5.  Security Issues in IP  Fundamental Issue Networks are not fully Secure (and never will be)  DOS Attacks, Replay Attacks and Spying etc.  IP causes  Source Spoofing  Replay Packets  No data Integrity or Confidentiality Why IPsec … ? (Cont..)
  • 6.  Authentication  To verify sources of IP packets  To prevent Replaying of Old Packets  To protect Integrity and/or Confidentiality of Packets  Data Integrity/ Data Encryption Goals of IPsec
  • 7.  Wei Xu started in July 1994 the research on IP Security, enhanced the IP protocols, developed the IPSec product.  The assembly software encryption was unable to support even aT1 (1.544MBps) speed.  Wei further developed an automated device driver, known as plug-and-play.  After achieving the throughput higher than a T1s, in December 1994, he finally made the commercial product, that was released as Gauntlet firewalll History of IPsec
  • 8. History (cont..)  In December 1993, Another IP Encapsulating Security Payload (ESP) was researched at the Naval Research Laboratory as DARPA project  ESP was derived from the US Department of Defense SP3D protocol.  The SecurityAuthentication Header (AH) is derived from previous IETF standard.  In 1995,The IPsec working group in the IETF was started to create Protocols.  IETF : Internet EngineeringTask Force
  • 10. Router Router Transport Mode Tunnel Mode IPsec Architecture
  • 11.  Transport Mode Transport Mode is used between end-stations supporting IPSec or between an end-station and a gateway, if the gateway is being treated as a host  Tunnel Mode Tunnel mode is used to encrypt traffic between secure IPSec gateways and it is also used to connect an end-station running IPSec Software. Modes of IPsec
  • 12. Modes of IPsec (Diagram)
  • 13. IP header IP header IP header TCP header TCP header TCP header data data data IPSec header IPSec header IP header Original Transport mode Tunnel mode Modes of IPsec (Diagram cont..)
  • 15. IPSec is broken into multiple protocols. These are:  Authentication Header (AH)  Encapsulated Security Payload (ESP)  Internet Key Exchange (IKE)  IP Payload Compression Protocols
  • 16. Authentication header is defined as: Authentication Header (AH)
  • 17.  Provides source authentication  Protects against source spoofing  Provides data integrity  Protects against replay attacks  Use monotonically increasing sequence numbers  Protects against denial of service attacks  NO protection for confidentiality! Authentication Header (Cont..)
  • 18. The following AH packet diagram shows how an AH packet is constructed and interpreted. Authentication Header (Cont..)
  • 19.  User and application transparent  Authentication  Integrity checking  Anti-replay  Protects entire packet Advantages of Authentication Header
  • 20.  No confidentiality  Unable to use NATs or proxies  Only works with TCP/IP Disadvantages of Authentication Header
  • 21. ESP is a member of the IPsec protocol suite. In IPsec it provides origin authenticity, integrity and confidentiality protection of packets. Encapsulating Security Payload (ESP)
  • 22. The following ESP packet diagram show how an ESP packet is constructed and interpreted. ESP (Cont..)
  • 23.  Does not protect entire packet  May not work with NATs or proxies  Only works with TCP/IP Disadvantages of ESP
  • 24.  User and application  transparent  Authentication  Integrity checking  Confidentiality  Anti-replay Advantages of ESP
  • 25.  Used for compression  Can be specified as part of the IPSec policy  Will not cover! IP Payload Compression
  • 26. Internet Key Exchange(IKE)  The internet key exchange is a protocol to set up a security association in the IPsec protocol.  Before secured data can be exchanged, a security agreement is established between two computers. In this security agreement(SA) both peers agree on how to exchange and protect information.
  • 28. The IKE (Internet Key Exchange) of IPsec is of two phases: 1) IKE phase 1 2) IKE phase 2 IPSec Phases
  • 29. IKE Phase 1 Diagram
  • 30. IKE phase 2 does the following things:  Negotiates IPsec SA parameters protected by an existing IKE SA.  Establishes Ipsec security associations.  Periodically negotiates IPsec SAs to ensure security. IKE Phase 2
  • 31. IKE Phase 2 Diagram
  • 32. Benefits of IKE  Automatic negotiation.  Authentication.  Anti replay services.  Certification authority.
  • 33.  Authentication  Integrity  Confidentiality IPSec Features
  • 34.  IPsec policy is a set of rules that governs when and how Windows uses IPsec protocol to secure the communications.  The IPsec policy interacts directly with the Ipsec driver.  IPsec consists of some basic elements which includes:  IP filter list  Individual IP filters  Filter actions A brief description is as follows: IPSec Policy
  • 35.  IP filter list contains the IP packets on which the action was applied.  Individual IP filters tells windows that on which IP packets actions should be performed.  Filter action is to secure the IP packets. IPSec Policy (Cont..)
  • 36. The IPsec policy also requires some info about the network which includes:  Security method to use  Connection type  Tunnel settings IPSec Policy (Cont..)
  • 37.  Security methods – which security algorithms to use for authentication and key exchanges.  Connection type – policy applied to remote access connections, LANs or all network connections.  Tunnel settings – IPsec use over a virtual private network. IPSec Policy (Cont..)
  • 38.  IPsec policies can be created or edited.  In windows, 3 default policies are stored which are:  Client policy  Server policy  Secure server policy IPSec Policy (Cont..)
  • 39.  IPsec policy to block PING traffic.  IPsec policy configuration through GPO. IPSec Policy Examples