Ip security

1,362 views

Published on

Published in: Technology, Education
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,362
On SlideShare
0
From Embeds
0
Number of Embeds
43
Actions
Shares
0
Downloads
40
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • does not protect IP header (difference from AH)
  • transparent to upper layers
  • Ip security

    1. 1. IP Security<br />Jernej Virag<br />21. 6. 2010<br />1<br />Jernej Virag<br />
    2. 2. IP Security<br />21. 6. 2010<br />Jernej Virag<br />2<br />
    3. 3. IPsec modes<br />Transport mode<br />injects IPSec headers into existing packets<br />Tunnel mode<br />all old headers and data is in payload after IPSec headers, new IP header is created<br />IPSec provides authentication and/or encryption in both modes<br />21. 6. 2010<br />Jernej Virag<br />3<br />
    4. 4. Authentication<br />21. 6. 2010<br />Jernej Virag<br />4<br />
    5. 5. Authentication header<br />21. 6. 2010<br />Jernej Virag<br />5<br />
    6. 6. Authentication<br />Algorithms<br />HMAC-MD5-96<br />HMAC-SHA1-96<br />ensures integrity<br />allows data origin authentication<br />prevents replay attacks<br />21. 6. 2010<br />Jernej Virag<br />6<br />
    7. 7. Encryption<br />21. 6. 2010<br />Jernej Virag<br />7<br />
    8. 8. Encryption header<br />21. 6. 2010<br />Jernej Virag<br />8<br />
    9. 9. Encryption<br />Algorithms<br />3DES<br />RC5<br />IDEA, 3IDEA<br />CAST<br />Blowfish<br />confidentiality<br />authentication<br />integrity<br />replay attack protection<br />21. 6. 2010<br />Jernej Virag<br />9<br />
    10. 10. Usage<br />21. 6. 2010<br />Jernej Virag<br />10<br />
    11. 11. IPSec usage<br />secure connectivity for dislocated network segments<br />secure access to internet<br />secure communication with parters<br />creation of secure VPNs<br />21. 6. 2010<br />Jernej Virag<br />11<br />
    12. 12. ?<br />21. 6. 2010<br />Jernej Virag<br />12<br />

    ×