Internet Protocol (IP) : It is the method or protocol by which data is sent from one computer to another on the Internet. [1]
Original version of the Internet Protocol that was first designed in 1983. [2]
Security: “The quality or state of being
secure—to be free from danger”.
IPSec protects all the traffic over the
network.
2. Agenda of the presentation:
Introduction
What is IPSec is…?
How IPSec Works
IPSec policies
Component of IPSec
References
3. Introduction…
Internet Protocol (IP) : It is the method or protocol by which data is
sent from one computer to another on the Internet. [1]
Original version of the Internet Protocol that was first designed in
1983. [2]
Security: “The quality or state of being
secure—to be free from danger”.
IPSec protects all the traffic over the
network.
4. What is IPSec is…?
Internet Protocol Security (IPSec): It is sets of protocols that
allow secure communication between two computer over an
unsecured network.
IPSec has two goal:
To protect IP packets
Providing defense against
network attack . [3]
5. IPSec secure network Traffic by using:
Encryption
Decryption
Data signing [3]
(trusted source)
7. IPSec policies work:
A security policy is a set of rules that define network
traffic at the IP layer.
IPSec protects your private network from Internet
attacks through end-to-end security.
IPSec policies must be carefully designed, configured,
coordinated and managed to ensure that IPSec
communication is successful. [7]
8. Three types of IPSec policies in the right pane:
Client (Respond Only)
Secure Server (Require Security)
Server (Request Security) [4]
9. Component of IPSec:
IPSec Components:
IPSec contains the following elements:
Encapsulating Security (ES): Provides confidentiality,
authentication, and integrity.
Authentication Header (AH): Provides authentication and
integrity.
Internet Key Exchange (IKE): Provides key management
and Security Association (SA) management. [5]
First of all I would like to givie the agenta of my presentataion… after that i will breifly disscuss one by one topic.
At the end of presentatio u will be able to explain…
When ip was designed… network are private…..all host are known.. no sec issue
With increse of internet.. Sec needed for ip…that’s way ipsec was develop
Data by using Ipsec is the data being send is secured before it is sent to the receiving computer.
Secured data can only be accessed by the authorized computer that is supposed to receive the data.
It means that the data was sent from a trusted source.
Whenever we transmit data from one computer to another computer. In Sending computer IPsec determinine the how data is encrypted and decrypted by both sending and recieveing computer
Ipsec resolve the security problem to create a session key that is required to encrypt and decrypte the data
When ipsec encrypt data and data is send to reciving computer.. Reciving computer uses the session key to decrypt the data
The first policy on the list is the Client (Respond Only) policy. This policy is designed to be run on client machines that don’t normally need to worry about security.
The next policy on the list is the Secure Server (Require Security) policy. This policy is only run servers that require all communications to be secure.
The final policy on the list is the Server (Request Security) policy. this policy can be used on both client and server that require all communications to be secure.
To make something (intelligent) into non-meaningless (un- intelligent way)
When receiver receives message M Receiver can verify M is indeed sent by the sender
When receiver receives message M
Can verify that message not modified during transmission