SlideShare a Scribd company logo
1 of 8
IP Sec
Shubham Ghimire
What is IPSec?
• Framework for ensuring private, secure communications over Internet
Protocol (IP) networks.
• provides authenticated and encrypted traffic between hosts at the IP
protocol level
• Provides aggressive protection against private network and Internet attacks
through end-to-end security.
• Protects communication between any two parties.
Services
Authentication & Verification
• Authentication means that ensuring that data has come from authentic user only
• Verification means that ensuring that data is not altered during the journey
Confidentiality
• Ensures that data is not visible to third party – during the journey
IPSec Protocols
• Authentication Header (AH)
- Authenticates the data flowing over connection
• Encapsulating Security Payload (ESP)
- Encrypts+Authenticate the data flowing over connection
Modes of Operation
Transport Mode Tunnel Mode
Provides a secure connection between two end-points Provides a secure connection between two gateways or either of
the end is a gateway i.e. host-to-gateway communication & vice
versa
Encapsulates IP Payload only Encapsulates complete IP packet (IP Header + Payload)
Simply a secured IP connection Primarily used for VPN
Transport vs Tunnel Mode
Why IPSec ?
• IPv4 not designed with security in mind
• Attacks possible with IPv4
• Eavesdropping
• Data modification
• Identity spoofing (IP address spoofing)
• Denial-of-service attack
• Man-in-the-middle attack
• These can be avoided by use of IPSec
IPSec RFCs
• IPSec documents:
• RFC 2401: An overview of security architecture
• RFC 2402: Description of a packet authentication extension to IPv4 and
IPv6
• RFC 2406: Description of a packet encryption extension to IPv4 and
IPv6
• RFC 2408: Specification of key managament capabilities

More Related Content

What's hot (20)

Steganography
Steganography Steganography
Steganography
 
Cyber security
Cyber securityCyber security
Cyber security
 
Phishing Presentation
Phishing Presentation Phishing Presentation
Phishing Presentation
 
IPsec
IPsecIPsec
IPsec
 
Ipsec
IpsecIpsec
Ipsec
 
Network security
Network securityNetwork security
Network security
 
Application Security
Application SecurityApplication Security
Application Security
 
Malware forensic
Malware forensicMalware forensic
Malware forensic
 
Encryption
EncryptionEncryption
Encryption
 
Ceh v5 module 07 sniffers
Ceh v5 module 07 sniffersCeh v5 module 07 sniffers
Ceh v5 module 07 sniffers
 
Information security
 Information security Information security
Information security
 
Web Security
Web SecurityWeb Security
Web Security
 
Network scanning
Network scanningNetwork scanning
Network scanning
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
Network Security
Network SecurityNetwork Security
Network Security
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
E-Commerce security
E-Commerce security E-Commerce security
E-Commerce security
 
Overview on hacking tools
Overview on hacking toolsOverview on hacking tools
Overview on hacking tools
 
Ethical Hacking Tools
Ethical Hacking ToolsEthical Hacking Tools
Ethical Hacking Tools
 
Cybersecurity: Dos and Dont's
Cybersecurity: Dos and Dont'sCybersecurity: Dos and Dont's
Cybersecurity: Dos and Dont's
 

Viewers also liked

Cognitive Science Unit 2
Cognitive Science Unit 2Cognitive Science Unit 2
Cognitive Science Unit 2CSITSansar
 
Cognitive science Unit 1
Cognitive science Unit 1Cognitive science Unit 1
Cognitive science Unit 1CSITSansar
 
Cognitive Science Unit 4
Cognitive Science Unit 4Cognitive Science Unit 4
Cognitive Science Unit 4CSITSansar
 
Virtual Functions | Polymorphism | OOP
Virtual Functions | Polymorphism | OOPVirtual Functions | Polymorphism | OOP
Virtual Functions | Polymorphism | OOPshubham ghimire
 
Writing In Exam | technical Writing
Writing In Exam | technical WritingWriting In Exam | technical Writing
Writing In Exam | technical Writingshubham ghimire
 
Functional Parameter & Scheduling Hierarchy | Real Time System
Functional Parameter & Scheduling Hierarchy | Real Time SystemFunctional Parameter & Scheduling Hierarchy | Real Time System
Functional Parameter & Scheduling Hierarchy | Real Time Systemshubham ghimire
 
Case Study | Introduction to Management
Case Study | Introduction to Management Case Study | Introduction to Management
Case Study | Introduction to Management shubham ghimire
 
External Environment | Business Environment
External Environment | Business EnvironmentExternal Environment | Business Environment
External Environment | Business Environmentshubham ghimire
 
NGOs In Nepal | NGOs Directory
NGOs In Nepal | NGOs DirectoryNGOs In Nepal | NGOs Directory
NGOs In Nepal | NGOs Directoryshubham ghimire
 

Viewers also liked (10)

Cognitive Science Unit 2
Cognitive Science Unit 2Cognitive Science Unit 2
Cognitive Science Unit 2
 
Cognitive science Unit 1
Cognitive science Unit 1Cognitive science Unit 1
Cognitive science Unit 1
 
Cognitive Science Unit 4
Cognitive Science Unit 4Cognitive Science Unit 4
Cognitive Science Unit 4
 
Virtual Functions | Polymorphism | OOP
Virtual Functions | Polymorphism | OOPVirtual Functions | Polymorphism | OOP
Virtual Functions | Polymorphism | OOP
 
Writing In Exam | technical Writing
Writing In Exam | technical WritingWriting In Exam | technical Writing
Writing In Exam | technical Writing
 
Functional Parameter & Scheduling Hierarchy | Real Time System
Functional Parameter & Scheduling Hierarchy | Real Time SystemFunctional Parameter & Scheduling Hierarchy | Real Time System
Functional Parameter & Scheduling Hierarchy | Real Time System
 
Cyber Crime
Cyber CrimeCyber Crime
Cyber Crime
 
Case Study | Introduction to Management
Case Study | Introduction to Management Case Study | Introduction to Management
Case Study | Introduction to Management
 
External Environment | Business Environment
External Environment | Business EnvironmentExternal Environment | Business Environment
External Environment | Business Environment
 
NGOs In Nepal | NGOs Directory
NGOs In Nepal | NGOs DirectoryNGOs In Nepal | NGOs Directory
NGOs In Nepal | NGOs Directory
 

Similar to IPSec | Computer Network (20)

Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
 
IP Security
IP SecurityIP Security
IP Security
 
BAIT1103 Chapter 6
BAIT1103 Chapter 6BAIT1103 Chapter 6
BAIT1103 Chapter 6
 
IP SEC.ptx
IP SEC.ptxIP SEC.ptx
IP SEC.ptx
 
The Security layer
The Security layerThe Security layer
The Security layer
 
IP security and VPN presentation
IP security and VPN presentation IP security and VPN presentation
IP security and VPN presentation
 
Ipsecurity
IpsecurityIpsecurity
Ipsecurity
 
IPSec VPN tunnel
IPSec VPN tunnelIPSec VPN tunnel
IPSec VPN tunnel
 
Lecture14..pdf
Lecture14..pdfLecture14..pdf
Lecture14..pdf
 
Ns lecture4: Introduction to Virtual Network Protocol(VPN) and Internet Proto...
Ns lecture4: Introduction to Virtual Network Protocol(VPN) and Internet Proto...Ns lecture4: Introduction to Virtual Network Protocol(VPN) and Internet Proto...
Ns lecture4: Introduction to Virtual Network Protocol(VPN) and Internet Proto...
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
 
Module 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptxModule 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptx
 
IP Security
IP SecurityIP Security
IP Security
 
ssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptxssl-tls-ipsec-vpn.pptx
ssl-tls-ipsec-vpn.pptx
 
Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
 
Ipsec vpn v0.1
Ipsec vpn v0.1Ipsec vpn v0.1
Ipsec vpn v0.1
 
Ip sec
Ip secIp sec
Ip sec
 
Ipsecurity
IpsecurityIpsecurity
Ipsecurity
 
Unit08
Unit08Unit08
Unit08
 
Ip security
Ip security Ip security
Ip security
 

Recently uploaded

办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 

Recently uploaded (17)

办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in  Rk Puram 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Rk Puram 🔝 9953056974 🔝 Delhi escort Service
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 

IPSec | Computer Network

  • 2. What is IPSec? • Framework for ensuring private, secure communications over Internet Protocol (IP) networks. • provides authenticated and encrypted traffic between hosts at the IP protocol level • Provides aggressive protection against private network and Internet attacks through end-to-end security. • Protects communication between any two parties.
  • 3. Services Authentication & Verification • Authentication means that ensuring that data has come from authentic user only • Verification means that ensuring that data is not altered during the journey Confidentiality • Ensures that data is not visible to third party – during the journey
  • 4. IPSec Protocols • Authentication Header (AH) - Authenticates the data flowing over connection • Encapsulating Security Payload (ESP) - Encrypts+Authenticate the data flowing over connection
  • 5. Modes of Operation Transport Mode Tunnel Mode Provides a secure connection between two end-points Provides a secure connection between two gateways or either of the end is a gateway i.e. host-to-gateway communication & vice versa Encapsulates IP Payload only Encapsulates complete IP packet (IP Header + Payload) Simply a secured IP connection Primarily used for VPN
  • 7. Why IPSec ? • IPv4 not designed with security in mind • Attacks possible with IPv4 • Eavesdropping • Data modification • Identity spoofing (IP address spoofing) • Denial-of-service attack • Man-in-the-middle attack • These can be avoided by use of IPSec
  • 8. IPSec RFCs • IPSec documents: • RFC 2401: An overview of security architecture • RFC 2402: Description of a packet authentication extension to IPv4 and IPv6 • RFC 2406: Description of a packet encryption extension to IPv4 and IPv6 • RFC 2408: Specification of key managament capabilities