SlideShare a Scribd company logo
IPsecurity
Presented By,
Jithu.k
IPsecurity
•Ipsecuity
•Architecture
•Security association(SA)
•Parameters associated to SA
•IPsecurity protocol mode
•Authentication header(AH)
•Encapsulation security payload(ESP)
•Key management
IPsecurityIP security encompasses four functional areas
• Authentication:- The mechanism assures that the packet not
modified in the way of transition.
• Confidentiality:- Communicating nodes to encrypt messages to
prevent eavesdropping.
• Key management:- Concerned with the secure of exchange of keys.
• Integrity:- The assurance that data received are exactly as sent by an
authorized entity.
.
The IPSec protocol implemented in two protocols.
• Authentication Header(AH).
Authentication along with Integrity.
• Encapsulating security payload(ESP).
ESP has two types
ESP with optional authentication.
ESP with authentication.
IPsecurity architecture
Security Association(SA)
• Communication between client and server.
• This is one-way communication.
• This is a temporary message/communication link between the sender
and receiver.
• Both parties wants to communicate, in both side SA should be
established.
Parameters for identifying SA
• Security Parameter Index:- This carried out a unique number to the
particular security association.
• IP Destination Address:- If the clients/sender wants to communicate
with server/receiver the client should have the server address.
• Protocol Identifier:- whether the protocol is ESP or AH.
Parameters Associated to SA
All security association maintained in SA database
• Security Parameter index(SPI).
• Sequence number counter.
• Sequence number overflow.
• Anti replay window.
• AH Information.
• ESP Information.
• Life time of SA.
IPsecurity protocol mode
• Transport mode:- The transport mode encrypts only the payload so
the IP header of the original packet is not encrypted. IPSec Transport
mode can be used when encrypting traffic between two hosts or
between a host and a VPN gateway.
• Tunnel mode:- The original IP packet is encapsulated within another
packet. In IPSec tunnel mode the original IP diagram from is
encapsulated with AH or ESP header and additional IP header. The
original IP diagram is encrypted inside IPSec packet.
Authentication Header(AH)
IPv4(transport mode)
Original IP
header
TCP Data
Before AH:-
After AH:-
Original IP
header
AH TCP Data
IPv6(transport mode)
Before applying AH:-
Original IP
header
Extension
header
TCP Data
After applying AH:-
Original
IP header
Extension
header
AH TCP Data
IPv4(tunnel mode)
Before applying AH:-
Original IP
header
TCP Data
After applying AH:-
New IP
header
AH Original
IP header
TCP Data
IPv6(tunnel mode)
Before applying AH:-
Original IP
header
Extend
header
TCP Data
After applying AH:-
New IP
header
Extend
header
AH Original
IP
header
Extend
header
TCP Data
Encapsulating Security Payload(ESP)
IPv4(transport mode)
Original IP
header
ESP header TCP Data ESP trailer ESP
authenticati
on trailer
IPv6(transport mode)
Original IP
header
Extension
header
ESP
Header
TCP Data ESP
trailer
ESP
authentic
ation
trailer
IPv4(tunnel mode)
New IP
header
ESP
header
Original
IP header
TCP Data ESP
trailer
ESP
authentic
ation
trailer
IPv6 (tunnel mode)
New IP
header
Extensi
on
header
ESP
header
Origina
l IP
header
Extensi
on
header
TCP Data ESP
trailer
ESP
authen
tication
trailer
Key Management
• Manual:- A system administrator manually configures each system
with its own keys. This is practical for small network, and relatively
static environments.
• Automated:- An automated system enables the on-demand
creation of keys foe Sas and facilitates the use of keys in large
distributed system with an evolving configuration.
.
IPsec referred to as ISAKMP or Oakley protocols
Oakley key determination protocol:- its is key exchange protocol based
on the Diffie-Hellman algorithm but provided added security.
Internet Security Association and Key Management Protocol(ISAKMP)
:- It provides a framework for internet key management,
And provides specific protocol support, including formats, for
negotiation of security attributes
THANK YOU

More Related Content

What's hot

Ipsec
IpsecIpsec
IPSec Overview
IPSec OverviewIPSec Overview
IPSec Overview
davisli
 
Ipsec 2
Ipsec 2Ipsec 2
Ipsec 2
Sourabh Badve
 
IP Sec by Amin Pathan
IP Sec by Amin PathanIP Sec by Amin Pathan
IP Sec by Amin Pathan
aminpathan11
 
ip security
ip securityip security
ip security
Chirag Patel
 
Ip security
Ip security Ip security
Ip security
Naveen Dubey
 
IPSec | Computer Network
IPSec | Computer NetworkIPSec | Computer Network
IPSec | Computer Network
shubham ghimire
 
IPsec
IPsecIPsec
BAIT1103 Chapter 6
BAIT1103 Chapter 6BAIT1103 Chapter 6
BAIT1103 Chapter 6
limsh
 
IPSec VPN tunnel
IPSec VPN tunnelIPSec VPN tunnel
IPSec VPN tunnel
ArunKumar Subbiah
 
IP Security and its Components
IP Security and its ComponentsIP Security and its Components
IP Security and its Components
Mohibullah Saail
 
Ipsec (network security)
Ipsec (network security)Ipsec (network security)
Ipsec (network security)
AhmadRahmanian1
 
Ipsec
IpsecIpsec
Ip sec talk
Ip sec talkIp sec talk
Ip sec talk
anoean
 
IPSec VPN & IPSec Protocols
IPSec VPN & IPSec ProtocolsIPSec VPN & IPSec Protocols
IPSec VPN & IPSec Protocols
NetProtocol Xpert
 
IP Security
IP SecurityIP Security
IP Security
Ambo University
 
Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip security
rajakhurram
 
Ipsec vpn v0.1
Ipsec vpn v0.1Ipsec vpn v0.1
IP Security in Network Security NS6
IP Security in Network Security NS6IP Security in Network Security NS6
IP Security in Network Security NS6
koolkampus
 

What's hot (19)

Ipsec
IpsecIpsec
Ipsec
 
IPSec Overview
IPSec OverviewIPSec Overview
IPSec Overview
 
Ipsec 2
Ipsec 2Ipsec 2
Ipsec 2
 
IP Sec by Amin Pathan
IP Sec by Amin PathanIP Sec by Amin Pathan
IP Sec by Amin Pathan
 
ip security
ip securityip security
ip security
 
Ip security
Ip security Ip security
Ip security
 
IPSec | Computer Network
IPSec | Computer NetworkIPSec | Computer Network
IPSec | Computer Network
 
IPsec
IPsecIPsec
IPsec
 
BAIT1103 Chapter 6
BAIT1103 Chapter 6BAIT1103 Chapter 6
BAIT1103 Chapter 6
 
IPSec VPN tunnel
IPSec VPN tunnelIPSec VPN tunnel
IPSec VPN tunnel
 
IP Security and its Components
IP Security and its ComponentsIP Security and its Components
IP Security and its Components
 
Ipsec (network security)
Ipsec (network security)Ipsec (network security)
Ipsec (network security)
 
Ipsec
IpsecIpsec
Ipsec
 
Ip sec talk
Ip sec talkIp sec talk
Ip sec talk
 
IPSec VPN & IPSec Protocols
IPSec VPN & IPSec ProtocolsIPSec VPN & IPSec Protocols
IPSec VPN & IPSec Protocols
 
IP Security
IP SecurityIP Security
IP Security
 
Lecture 5 ip security
Lecture 5 ip securityLecture 5 ip security
Lecture 5 ip security
 
Ipsec vpn v0.1
Ipsec vpn v0.1Ipsec vpn v0.1
Ipsec vpn v0.1
 
IP Security in Network Security NS6
IP Security in Network Security NS6IP Security in Network Security NS6
IP Security in Network Security NS6
 

Similar to Ip security

IP SEC.ptx
IP SEC.ptxIP SEC.ptx
IP SEC.ptx
MamoonKhan40
 
Chapter 6.ppt
Chapter 6.pptChapter 6.ppt
Chapter 6.ppt
ssuserec53e73
 
Chapter 6 (1).ppt
Chapter 6 (1).pptChapter 6 (1).ppt
Chapter 6 (1).ppt
ssuserec53e73
 
Chapter 6 (1).ppt
Chapter 6 (1).pptChapter 6 (1).ppt
Chapter 6 (1).ppt
DivyaSek
 
Ip security in i psec
Ip security in i psecIp security in i psec
Ip security in i psec
Mohd Arif
 
IPsec for IMS
IPsec for IMSIPsec for IMS
IPsec for IMS
Hossein Yavari
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
Kathirvel Ayyaswamy
 
IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1
Shobhit Sharma
 
IS Unit-4 .ppt
IS Unit-4 .pptIS Unit-4 .ppt
IS Unit-4 .ppt
NamanRockzz
 
The Security layer
The Security layerThe Security layer
The Security layer
Swetha S
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
Mohd Arif
 
Ip Sec Rev1
Ip Sec Rev1Ip Sec Rev1
Ip Sec Rev1
Ram Dutt Shukla
 
rooster-ipsecindepth.ppt
rooster-ipsecindepth.pptrooster-ipsecindepth.ppt
rooster-ipsecindepth.ppt
ImXaib
 
ahmed hossam EltokhyEltokhyEltokhy2.pptx
ahmed hossam EltokhyEltokhyEltokhy2.pptxahmed hossam EltokhyEltokhyEltokhy2.pptx
ahmed hossam EltokhyEltokhyEltokhy2.pptx
FutureTechnologies3
 
Ip Sec
Ip SecIp Sec
Lecture14..pdf
Lecture14..pdfLecture14..pdf
Lecture14..pdf
AlaaElhaddad3
 
8.X Sec & I Pv6
8.X Sec & I Pv68.X Sec & I Pv6
8.X Sec & I Pv6
phanleson
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
Gopal Karthik
 
Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
Kabul Education University
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
PriyadharshiniVS
 

Similar to Ip security (20)

IP SEC.ptx
IP SEC.ptxIP SEC.ptx
IP SEC.ptx
 
Chapter 6.ppt
Chapter 6.pptChapter 6.ppt
Chapter 6.ppt
 
Chapter 6 (1).ppt
Chapter 6 (1).pptChapter 6 (1).ppt
Chapter 6 (1).ppt
 
Chapter 6 (1).ppt
Chapter 6 (1).pptChapter 6 (1).ppt
Chapter 6 (1).ppt
 
Ip security in i psec
Ip security in i psecIp security in i psec
Ip security in i psec
 
IPsec for IMS
IPsec for IMSIPsec for IMS
IPsec for IMS
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1
 
IS Unit-4 .ppt
IS Unit-4 .pptIS Unit-4 .ppt
IS Unit-4 .ppt
 
The Security layer
The Security layerThe Security layer
The Security layer
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
 
Ip Sec Rev1
Ip Sec Rev1Ip Sec Rev1
Ip Sec Rev1
 
rooster-ipsecindepth.ppt
rooster-ipsecindepth.pptrooster-ipsecindepth.ppt
rooster-ipsecindepth.ppt
 
ahmed hossam EltokhyEltokhyEltokhy2.pptx
ahmed hossam EltokhyEltokhyEltokhy2.pptxahmed hossam EltokhyEltokhyEltokhy2.pptx
ahmed hossam EltokhyEltokhyEltokhy2.pptx
 
Ip Sec
Ip SecIp Sec
Ip Sec
 
Lecture14..pdf
Lecture14..pdfLecture14..pdf
Lecture14..pdf
 
8.X Sec & I Pv6
8.X Sec & I Pv68.X Sec & I Pv6
8.X Sec & I Pv6
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 

Recently uploaded

Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Łukasz Chruściel
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
ICS
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
Adele Miller
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
lorraineandreiamcidl
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
Hornet Dynamics
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
Boni García
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
Aftab Hussain
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
rodomar2
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
Shane Coughlan
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
Sven Peters
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
SOCRadar
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
Rakesh Kumar R
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
Aftab Hussain
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
NYGGS Automation Suite
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
rickgrimesss22
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
Alina Yurenko
 

Recently uploaded (20)

Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️Need for Speed: Removing speed bumps from your Symfony projects ⚡️
Need for Speed: Removing speed bumps from your Symfony projects ⚡️
 
Webinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for EmbeddedWebinar On-Demand: Using Flutter for Embedded
Webinar On-Demand: Using Flutter for Embedded
 
May Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdfMay Marketo Masterclass, London MUG May 22 2024.pdf
May Marketo Masterclass, London MUG May 22 2024.pdf
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptxLORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
LORRAINE ANDREI_LEQUIGAN_HOW TO USE WHATSAPP.pptx
 
E-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet DynamicsE-commerce Development Services- Hornet Dynamics
E-commerce Development Services- Hornet Dynamics
 
APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)APIs for Browser Automation (MoT Meetup 2024)
APIs for Browser Automation (MoT Meetup 2024)
 
Graspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code AnalysisGraspan: A Big Data System for Big Code Analysis
Graspan: A Big Data System for Big Code Analysis
 
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CDKuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
KuberTENes Birthday Bash Guadalajara - Introducción a Argo CD
 
openEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain SecurityopenEuler Case Study - The Journey to Supply Chain Security
openEuler Case Study - The Journey to Supply Chain Security
 
Microservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we workMicroservice Teams - How the cloud changes the way we work
Microservice Teams - How the cloud changes the way we work
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
 
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket ManagementUtilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
Utilocate provides Smarter, Better, Faster, Safer Locate Ticket Management
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
 
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of CodeA Study of Variable-Role-based Feature Enrichment in Neural Models of Code
A Study of Variable-Role-based Feature Enrichment in Neural Models of Code
 
Enterprise Resource Planning System in Telangana
Enterprise Resource Planning System in TelanganaEnterprise Resource Planning System in Telangana
Enterprise Resource Planning System in Telangana
 
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxTop Features to Include in Your Winzo Clone App for Business Growth (4).pptx
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptx
 
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)GOING AOT WITH GRAALVM FOR  SPRING BOOT (SPRING IO)
GOING AOT WITH GRAALVM FOR SPRING BOOT (SPRING IO)
 

Ip security

  • 2. IPsecurity •Ipsecuity •Architecture •Security association(SA) •Parameters associated to SA •IPsecurity protocol mode •Authentication header(AH) •Encapsulation security payload(ESP) •Key management
  • 3. IPsecurityIP security encompasses four functional areas • Authentication:- The mechanism assures that the packet not modified in the way of transition. • Confidentiality:- Communicating nodes to encrypt messages to prevent eavesdropping. • Key management:- Concerned with the secure of exchange of keys. • Integrity:- The assurance that data received are exactly as sent by an authorized entity.
  • 4. . The IPSec protocol implemented in two protocols. • Authentication Header(AH). Authentication along with Integrity. • Encapsulating security payload(ESP). ESP has two types ESP with optional authentication. ESP with authentication.
  • 6. Security Association(SA) • Communication between client and server. • This is one-way communication. • This is a temporary message/communication link between the sender and receiver. • Both parties wants to communicate, in both side SA should be established.
  • 7. Parameters for identifying SA • Security Parameter Index:- This carried out a unique number to the particular security association. • IP Destination Address:- If the clients/sender wants to communicate with server/receiver the client should have the server address. • Protocol Identifier:- whether the protocol is ESP or AH.
  • 8. Parameters Associated to SA All security association maintained in SA database • Security Parameter index(SPI). • Sequence number counter. • Sequence number overflow. • Anti replay window. • AH Information. • ESP Information. • Life time of SA.
  • 9. IPsecurity protocol mode • Transport mode:- The transport mode encrypts only the payload so the IP header of the original packet is not encrypted. IPSec Transport mode can be used when encrypting traffic between two hosts or between a host and a VPN gateway. • Tunnel mode:- The original IP packet is encapsulated within another packet. In IPSec tunnel mode the original IP diagram from is encapsulated with AH or ESP header and additional IP header. The original IP diagram is encrypted inside IPSec packet.
  • 11. IPv4(transport mode) Original IP header TCP Data Before AH:- After AH:- Original IP header AH TCP Data
  • 12. IPv6(transport mode) Before applying AH:- Original IP header Extension header TCP Data After applying AH:- Original IP header Extension header AH TCP Data
  • 13. IPv4(tunnel mode) Before applying AH:- Original IP header TCP Data After applying AH:- New IP header AH Original IP header TCP Data
  • 14. IPv6(tunnel mode) Before applying AH:- Original IP header Extend header TCP Data After applying AH:- New IP header Extend header AH Original IP header Extend header TCP Data
  • 16. IPv4(transport mode) Original IP header ESP header TCP Data ESP trailer ESP authenticati on trailer IPv6(transport mode) Original IP header Extension header ESP Header TCP Data ESP trailer ESP authentic ation trailer
  • 17. IPv4(tunnel mode) New IP header ESP header Original IP header TCP Data ESP trailer ESP authentic ation trailer IPv6 (tunnel mode) New IP header Extensi on header ESP header Origina l IP header Extensi on header TCP Data ESP trailer ESP authen tication trailer
  • 18. Key Management • Manual:- A system administrator manually configures each system with its own keys. This is practical for small network, and relatively static environments. • Automated:- An automated system enables the on-demand creation of keys foe Sas and facilitates the use of keys in large distributed system with an evolving configuration.
  • 19. . IPsec referred to as ISAKMP or Oakley protocols Oakley key determination protocol:- its is key exchange protocol based on the Diffie-Hellman algorithm but provided added security. Internet Security Association and Key Management Protocol(ISAKMP) :- It provides a framework for internet key management, And provides specific protocol support, including formats, for negotiation of security attributes