SlideShare a Scribd company logo
IP Security
One problem with Internet protocol (IP) is that it has no method for confirming the authenticity
and security of data as it moves through the net. IP datagrams are typically routed between
devices over disparate networks; as a result, information within these datagrams could be
intercepted and altered. As use of the Internet for critical applications has increased, the need for
enhancements to IP security became necessary. As a result, the Internet Engineering Task Force
(IETF) created a set of protocols called IP Security, or IPsec, to support the secure exchange of
packets over the Internet. IPsec is now a mandatory component of IPv6 and must be supported
for any IPv6 implementation. IPsec is implemented in IPv6 using the authentication header (AH)
and the encapsulating security payload (ESP) extension header.
Answer the following questions in a 3- to 4-page, APA-formatted paper:
1 What is IPsec, and why is it necessary? How is IPsec used in VPN?
2 Which network layer currently suffers from attacks, and why? At which layers of the
network stack architecture should a solution be attempted? Provide details.
3 How is IP security achieved? What is the basic authentication scheme? Which mechanisms
are used? What are some of the application venues of IPsec?
4 How is a VPN implemented on a server so that its clients can connect to it?
Remember to properly cite your sources according to APA guidelines.
Solution
IPSec
IPsec also known as IP Security.Internet Protocol Security is a framework for a set of protocols
that provide security for internet protocol. It can use cryptography to provide security. IPsec
support network level data integrity, data confidentiality. As it is integrated at the internet layer
(i.e. layer 3), it provides security for all the protocols in the TCP/IP. IPsec applied transparently
to the applications, there is no need to configure separate security for each application the uses
TCP/IP.
IPsec provides security for
IPsec provides two choices of security service: Authentication Header (AH), which essentially
allows authentication of the sender of data, and Encapsulating Security Payload (ESP), which
supports both authentication of the sender and encryption of data as well. The specific
information associated with each of these services is inserted into the packet in a header that
follows the IP packet header. Separate key protocols can be selected, such as the
ISAKMP/Oakley protocol.
IPsec is necessary for
Earlier security approaches have inserted security at the Application layer of the communications
model. IPsec is said to be especially useful for implementing virtual private networks and for
remote user access through dial-up connection to private networks. A big advantage of IPsec is
that security arrangements can be handled without requiring changes to individual user
computers. Cisco has been a leader in proposing IPsec as a standard (or combination of standards
and technologies) and has included support for it in its network routers.
VPN
Virtual Private Network or VPN is a type of network setup in which the public
telecommunication medium and the public network, i.e. the Internet, is used to transmit data
from one office at one geographical location to another office at another geographical location.
IPsec used in VPN
Below is the process that takes place during site-to-site communication over an IPsec VPN site-
to-site tunnel:
· The source computer C1 forwards the packet P1 with the destination IP address of the
computer C2 to the router R1 (default gateway).
· The router R1 receives the packet P1 and encrypts the entire packet using the specified
algorithm.
· After encrypting the packet, the router R1 encapsulates the whole packet to form a new
packet NP1. This packet has IP address of R1 as source IP and the IP address of the router R2
(the router placed at the destination location) as the destination IP.
· The router R1 then forwards the packet NP1 to the IP address of R2 using the Internet.
· The destination router R2 receives the packet.
· The router R2 decapsulates the NP1 to get the original packet P1.
· The router R2 decrypts the packet P1 using the appropriate algorithm.
· The router R2 then forwards the packet P1 to the destination computer C2, where the
packet was actually supposed to reach.
Advantages of Using IPsec VPN Site-to-Site Tunnels
IPsec VPN site-to-site tunnels offer numerous advantages. Some of them are:
· Requirement of buying dedicated expensive lease lines from one site to another is
completely eliminated as public telecommunication lines are used to transmit data.
· The internal IP addresses of both the participating networks and nodes remain hidden
from each other and from the external users.
· The entire communication between the source and destination sites remains encrypted
which means that chances of information theft are extremely low.
Disadvantages of IPsec VPN Site-to-Site Tunnels
A few disadvantages of using IPsec VPN site-to-site tunnels are:
· Expensive router is required at each site to play the role of the VPN server.
· Since encapsulation, decapsulation, encryption and decryption takes place at the routers,
these devices may face processing overhead and increased CPU utilization. Because of this,
users may experience reduced communication speed.
· The configuration process of IPsec VPN site-to-site is complex and requires highly skilled
and qualified IT professionals to be hired to get the job done with perfection.
Network layer currently suffers from attacks
Network layer currently suffers from attacks are listed bellow
Application layer
Transport layer
Network layer
Data link layer
How can IP Security be achieved?
There are two specific headers that can be attached to IP packet to achieve security. They are the
IP Authentication Header (AH) and the IP Encapsulating Security Payload (ESP) header.
If confidentiality is not required, the Authentication Header (AH) alone can provide security (in
this case, connectionless data integrity and data origin authentication) to IP datagram. The
implementation can be host-host, host-gateway or gateway-gateway. But only host-host
implementation is encouraged. The reason is that, in the case that security gateway provides
security service for the trusted hosts behind the gateway, The security attack can still arise when
the trusted hosts become untrusted. In other words the security can be violated for two
communicating end user if the security (without confidentiality) does not cover completely the
communicating path, but instead stop at the gateway, even though SA is established. Certainly in
any kind of implementation, the untrusted systems (i.e., the systems that don't have the SA
established) can't have the ability to attack data authentication ( always referring to both data
integrity and data origin authentication) .
The IP Encapsulating Security Payload (ESP) header provides integrity, authentication, and
confidentiality to IP datagrams . It can provide a mix of optional security . ESP header can be
applied alone, in combination with the IP Authentication Header(AH), or in a nested way, e. g.
by using Tunnel-mode. The ESP header implementation can be host-host, host-gateway, or
gateway-gateway. The ESP header is inserted after the IP header and before a higher-level
protocol header(Transport-mode) or the encapsulated IP header(Tunnel-mode). Gateway-to-
gateway ESP implementation, using encryption/decryption , is critical for building Private
Virtual Networks (PVN) across an untrusted backbone in an open environment such as the
Internet.

More Related Content

Similar to IP Security One problem with Internet protocol (IP) is that it has.pdf

Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Vanitha Joshi
 
Cns unit4
Cns unit4Cns unit4
Cns unit4
PRADEEPJ30
 
Cns unit4
Cns unit4Cns unit4
Cns unit4
PRADEEPJ30
 
IP Security
IP SecurityIP Security
IP Security
Dr.Florence Dayana
 
cisco-nti-Day20
cisco-nti-Day20cisco-nti-Day20
cisco-nti-Day20
eyad alaa
 
28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)
IAESIJEECS
 
28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)
IAESIJEECS
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
Vuz Dở Hơi
 
Working Survey of Authentication Header and Encapsulating Security Payload
Working Survey of Authentication Header and Encapsulating Security PayloadWorking Survey of Authentication Header and Encapsulating Security Payload
Working Survey of Authentication Header and Encapsulating Security Payload
ijtsrd
 
Ipsecurity
IpsecurityIpsecurity
Ipsecurity
Chinmay Patel
 
Ip security
Ip security Ip security
Ip security
Naveen Dubey
 
Network Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. ShivashankarNetwork Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. Shivashankar
Dr. Shivashankar
 
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET Journal
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptx
karthikvcyber
 
Ipsecurity
IpsecurityIpsecurity
Module 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptxModule 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptx
AliMohamed855266
 
Lecture14..pdf
Lecture14..pdfLecture14..pdf
Lecture14..pdf
AlaaElhaddad3
 
Ip Security.pptx
Ip Security.pptxIp Security.pptx
Ip Security.pptx
TouseeqHaider11
 
BAIT1103 Chapter 6
BAIT1103 Chapter 6BAIT1103 Chapter 6
BAIT1103 Chapter 6limsh
 

Similar to IP Security One problem with Internet protocol (IP) is that it has.pdf (20)

Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
 
Cns unit4
Cns unit4Cns unit4
Cns unit4
 
Cns unit4
Cns unit4Cns unit4
Cns unit4
 
IP Security
IP SecurityIP Security
IP Security
 
cisco-nti-Day20
cisco-nti-Day20cisco-nti-Day20
cisco-nti-Day20
 
V P N
V P NV P N
V P N
 
28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)
 
28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)
 
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site ConnectivityCCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
CCNAv5 - S4: Chapter 7: Securing Site-to-site Connectivity
 
Working Survey of Authentication Header and Encapsulating Security Payload
Working Survey of Authentication Header and Encapsulating Security PayloadWorking Survey of Authentication Header and Encapsulating Security Payload
Working Survey of Authentication Header and Encapsulating Security Payload
 
Ipsecurity
IpsecurityIpsecurity
Ipsecurity
 
Ip security
Ip security Ip security
Ip security
 
Network Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. ShivashankarNetwork Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. Shivashankar
 
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
IRJET - Virtual Private Network Implementation on PC as a Router for Privacy ...
 
IPS NAT and VPN.pptx
IPS NAT and VPN.pptxIPS NAT and VPN.pptx
IPS NAT and VPN.pptx
 
Ipsecurity
IpsecurityIpsecurity
Ipsecurity
 
Module 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptxModule 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptx
 
Lecture14..pdf
Lecture14..pdfLecture14..pdf
Lecture14..pdf
 
Ip Security.pptx
Ip Security.pptxIp Security.pptx
Ip Security.pptx
 
BAIT1103 Chapter 6
BAIT1103 Chapter 6BAIT1103 Chapter 6
BAIT1103 Chapter 6
 

More from solimankellymattwe60

What are the products of the secondary metabolism in plants Terpeno.pdf
What are the products of the secondary metabolism in plants  Terpeno.pdfWhat are the products of the secondary metabolism in plants  Terpeno.pdf
What are the products of the secondary metabolism in plants Terpeno.pdf
solimankellymattwe60
 
Which of the following is incorrect about emergent propertiesA. T.pdf
Which of the following is incorrect about emergent propertiesA. T.pdfWhich of the following is incorrect about emergent propertiesA. T.pdf
Which of the following is incorrect about emergent propertiesA. T.pdf
solimankellymattwe60
 
Which sensor i can use it for my robot when i dont want it to fil.pdf
Which sensor i can use it for my robot when i dont want it to fil.pdfWhich sensor i can use it for my robot when i dont want it to fil.pdf
Which sensor i can use it for my robot when i dont want it to fil.pdf
solimankellymattwe60
 
Why might firms consider issuing stock in foreign countries Why mig.pdf
Why might firms consider issuing stock in foreign countries Why mig.pdfWhy might firms consider issuing stock in foreign countries Why mig.pdf
Why might firms consider issuing stock in foreign countries Why mig.pdf
solimankellymattwe60
 
What were the Spanish soldiers who fought in the conquests in the Ne.pdf
What were the Spanish soldiers who fought in the conquests in the Ne.pdfWhat were the Spanish soldiers who fought in the conquests in the Ne.pdf
What were the Spanish soldiers who fought in the conquests in the Ne.pdf
solimankellymattwe60
 
What is forecasting Explain the different techniques of forecasting.pdf
What is forecasting Explain the different techniques of forecasting.pdfWhat is forecasting Explain the different techniques of forecasting.pdf
What is forecasting Explain the different techniques of forecasting.pdf
solimankellymattwe60
 
Ventura Capital is a financier who specializes in capitalizing start.pdf
Ventura Capital is a financier who specializes in capitalizing start.pdfVentura Capital is a financier who specializes in capitalizing start.pdf
Ventura Capital is a financier who specializes in capitalizing start.pdf
solimankellymattwe60
 
True or False1. A basidium is a cell of the Basidiomycota in whic.pdf
True or False1. A basidium is a cell of the Basidiomycota in whic.pdfTrue or False1. A basidium is a cell of the Basidiomycota in whic.pdf
True or False1. A basidium is a cell of the Basidiomycota in whic.pdf
solimankellymattwe60
 
The mitochondrial electron transport system (METS) and the photos.pdf
The mitochondrial electron transport system (METS) and the photos.pdfThe mitochondrial electron transport system (METS) and the photos.pdf
The mitochondrial electron transport system (METS) and the photos.pdf
solimankellymattwe60
 
The disclosure of a contingent liability in the footnotes and on t.pdf
The disclosure of a contingent liability in the footnotes and on t.pdfThe disclosure of a contingent liability in the footnotes and on t.pdf
The disclosure of a contingent liability in the footnotes and on t.pdf
solimankellymattwe60
 
The application architeture is design by the application developer a.pdf
The application architeture is design by the application developer a.pdfThe application architeture is design by the application developer a.pdf
The application architeture is design by the application developer a.pdf
solimankellymattwe60
 
Suppose a company’s ROE is 16. This company’s payout ratio is 40. .pdf
Suppose a company’s ROE is 16. This company’s payout ratio is 40. .pdfSuppose a company’s ROE is 16. This company’s payout ratio is 40. .pdf
Suppose a company’s ROE is 16. This company’s payout ratio is 40. .pdf
solimankellymattwe60
 
Some historians have referred to many of the self-proclaimed “Darwin.pdf
Some historians have referred to many of the self-proclaimed “Darwin.pdfSome historians have referred to many of the self-proclaimed “Darwin.pdf
Some historians have referred to many of the self-proclaimed “Darwin.pdf
solimankellymattwe60
 
Please research Meaningful Use. Prepare a brief report on its origin.pdf
Please research Meaningful Use. Prepare a brief report on its origin.pdfPlease research Meaningful Use. Prepare a brief report on its origin.pdf
Please research Meaningful Use. Prepare a brief report on its origin.pdf
solimankellymattwe60
 
Mention the major difference in the physical phenomena occurring rel.pdf
Mention the major difference in the physical phenomena occurring rel.pdfMention the major difference in the physical phenomena occurring rel.pdf
Mention the major difference in the physical phenomena occurring rel.pdf
solimankellymattwe60
 
My code is not matching up with the results.The output for the cod.pdf
My code is not matching up with the results.The output for the cod.pdfMy code is not matching up with the results.The output for the cod.pdf
My code is not matching up with the results.The output for the cod.pdf
solimankellymattwe60
 
Logical FallociesP1 All college students have pet monkeys.P2 J.pdf
Logical FallociesP1 All college students have pet monkeys.P2 J.pdfLogical FallociesP1 All college students have pet monkeys.P2 J.pdf
Logical FallociesP1 All college students have pet monkeys.P2 J.pdf
solimankellymattwe60
 
Genmo CorporationOn the night of February 27, 2012, certain recor.pdf
Genmo CorporationOn the night of February 27, 2012, certain recor.pdfGenmo CorporationOn the night of February 27, 2012, certain recor.pdf
Genmo CorporationOn the night of February 27, 2012, certain recor.pdf
solimankellymattwe60
 
In the formula for determining a populations genotype frequencies, .pdf
In the formula for determining a populations genotype frequencies, .pdfIn the formula for determining a populations genotype frequencies, .pdf
In the formula for determining a populations genotype frequencies, .pdf
solimankellymattwe60
 
How is a cell membrane selectively permeable - what permeates and.pdf
How is a cell membrane selectively permeable - what permeates and.pdfHow is a cell membrane selectively permeable - what permeates and.pdf
How is a cell membrane selectively permeable - what permeates and.pdf
solimankellymattwe60
 

More from solimankellymattwe60 (20)

What are the products of the secondary metabolism in plants Terpeno.pdf
What are the products of the secondary metabolism in plants  Terpeno.pdfWhat are the products of the secondary metabolism in plants  Terpeno.pdf
What are the products of the secondary metabolism in plants Terpeno.pdf
 
Which of the following is incorrect about emergent propertiesA. T.pdf
Which of the following is incorrect about emergent propertiesA. T.pdfWhich of the following is incorrect about emergent propertiesA. T.pdf
Which of the following is incorrect about emergent propertiesA. T.pdf
 
Which sensor i can use it for my robot when i dont want it to fil.pdf
Which sensor i can use it for my robot when i dont want it to fil.pdfWhich sensor i can use it for my robot when i dont want it to fil.pdf
Which sensor i can use it for my robot when i dont want it to fil.pdf
 
Why might firms consider issuing stock in foreign countries Why mig.pdf
Why might firms consider issuing stock in foreign countries Why mig.pdfWhy might firms consider issuing stock in foreign countries Why mig.pdf
Why might firms consider issuing stock in foreign countries Why mig.pdf
 
What were the Spanish soldiers who fought in the conquests in the Ne.pdf
What were the Spanish soldiers who fought in the conquests in the Ne.pdfWhat were the Spanish soldiers who fought in the conquests in the Ne.pdf
What were the Spanish soldiers who fought in the conquests in the Ne.pdf
 
What is forecasting Explain the different techniques of forecasting.pdf
What is forecasting Explain the different techniques of forecasting.pdfWhat is forecasting Explain the different techniques of forecasting.pdf
What is forecasting Explain the different techniques of forecasting.pdf
 
Ventura Capital is a financier who specializes in capitalizing start.pdf
Ventura Capital is a financier who specializes in capitalizing start.pdfVentura Capital is a financier who specializes in capitalizing start.pdf
Ventura Capital is a financier who specializes in capitalizing start.pdf
 
True or False1. A basidium is a cell of the Basidiomycota in whic.pdf
True or False1. A basidium is a cell of the Basidiomycota in whic.pdfTrue or False1. A basidium is a cell of the Basidiomycota in whic.pdf
True or False1. A basidium is a cell of the Basidiomycota in whic.pdf
 
The mitochondrial electron transport system (METS) and the photos.pdf
The mitochondrial electron transport system (METS) and the photos.pdfThe mitochondrial electron transport system (METS) and the photos.pdf
The mitochondrial electron transport system (METS) and the photos.pdf
 
The disclosure of a contingent liability in the footnotes and on t.pdf
The disclosure of a contingent liability in the footnotes and on t.pdfThe disclosure of a contingent liability in the footnotes and on t.pdf
The disclosure of a contingent liability in the footnotes and on t.pdf
 
The application architeture is design by the application developer a.pdf
The application architeture is design by the application developer a.pdfThe application architeture is design by the application developer a.pdf
The application architeture is design by the application developer a.pdf
 
Suppose a company’s ROE is 16. This company’s payout ratio is 40. .pdf
Suppose a company’s ROE is 16. This company’s payout ratio is 40. .pdfSuppose a company’s ROE is 16. This company’s payout ratio is 40. .pdf
Suppose a company’s ROE is 16. This company’s payout ratio is 40. .pdf
 
Some historians have referred to many of the self-proclaimed “Darwin.pdf
Some historians have referred to many of the self-proclaimed “Darwin.pdfSome historians have referred to many of the self-proclaimed “Darwin.pdf
Some historians have referred to many of the self-proclaimed “Darwin.pdf
 
Please research Meaningful Use. Prepare a brief report on its origin.pdf
Please research Meaningful Use. Prepare a brief report on its origin.pdfPlease research Meaningful Use. Prepare a brief report on its origin.pdf
Please research Meaningful Use. Prepare a brief report on its origin.pdf
 
Mention the major difference in the physical phenomena occurring rel.pdf
Mention the major difference in the physical phenomena occurring rel.pdfMention the major difference in the physical phenomena occurring rel.pdf
Mention the major difference in the physical phenomena occurring rel.pdf
 
My code is not matching up with the results.The output for the cod.pdf
My code is not matching up with the results.The output for the cod.pdfMy code is not matching up with the results.The output for the cod.pdf
My code is not matching up with the results.The output for the cod.pdf
 
Logical FallociesP1 All college students have pet monkeys.P2 J.pdf
Logical FallociesP1 All college students have pet monkeys.P2 J.pdfLogical FallociesP1 All college students have pet monkeys.P2 J.pdf
Logical FallociesP1 All college students have pet monkeys.P2 J.pdf
 
Genmo CorporationOn the night of February 27, 2012, certain recor.pdf
Genmo CorporationOn the night of February 27, 2012, certain recor.pdfGenmo CorporationOn the night of February 27, 2012, certain recor.pdf
Genmo CorporationOn the night of February 27, 2012, certain recor.pdf
 
In the formula for determining a populations genotype frequencies, .pdf
In the formula for determining a populations genotype frequencies, .pdfIn the formula for determining a populations genotype frequencies, .pdf
In the formula for determining a populations genotype frequencies, .pdf
 
How is a cell membrane selectively permeable - what permeates and.pdf
How is a cell membrane selectively permeable - what permeates and.pdfHow is a cell membrane selectively permeable - what permeates and.pdf
How is a cell membrane selectively permeable - what permeates and.pdf
 

Recently uploaded

STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
kimdan468
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Atul Kumar Singh
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 

Recently uploaded (20)

STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBCSTRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
STRAND 3 HYGIENIC PRACTICES.pptx GRADE 7 CBC
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Guidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th SemesterGuidance_and_Counselling.pdf B.Ed. 4th Semester
Guidance_and_Counselling.pdf B.Ed. 4th Semester
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 

IP Security One problem with Internet protocol (IP) is that it has.pdf

  • 1. IP Security One problem with Internet protocol (IP) is that it has no method for confirming the authenticity and security of data as it moves through the net. IP datagrams are typically routed between devices over disparate networks; as a result, information within these datagrams could be intercepted and altered. As use of the Internet for critical applications has increased, the need for enhancements to IP security became necessary. As a result, the Internet Engineering Task Force (IETF) created a set of protocols called IP Security, or IPsec, to support the secure exchange of packets over the Internet. IPsec is now a mandatory component of IPv6 and must be supported for any IPv6 implementation. IPsec is implemented in IPv6 using the authentication header (AH) and the encapsulating security payload (ESP) extension header. Answer the following questions in a 3- to 4-page, APA-formatted paper: 1 What is IPsec, and why is it necessary? How is IPsec used in VPN? 2 Which network layer currently suffers from attacks, and why? At which layers of the network stack architecture should a solution be attempted? Provide details. 3 How is IP security achieved? What is the basic authentication scheme? Which mechanisms are used? What are some of the application venues of IPsec? 4 How is a VPN implemented on a server so that its clients can connect to it? Remember to properly cite your sources according to APA guidelines. Solution IPSec IPsec also known as IP Security.Internet Protocol Security is a framework for a set of protocols that provide security for internet protocol. It can use cryptography to provide security. IPsec support network level data integrity, data confidentiality. As it is integrated at the internet layer (i.e. layer 3), it provides security for all the protocols in the TCP/IP. IPsec applied transparently to the applications, there is no need to configure separate security for each application the uses TCP/IP. IPsec provides security for IPsec provides two choices of security service: Authentication Header (AH), which essentially allows authentication of the sender of data, and Encapsulating Security Payload (ESP), which supports both authentication of the sender and encryption of data as well. The specific information associated with each of these services is inserted into the packet in a header that follows the IP packet header. Separate key protocols can be selected, such as the ISAKMP/Oakley protocol.
  • 2. IPsec is necessary for Earlier security approaches have inserted security at the Application layer of the communications model. IPsec is said to be especially useful for implementing virtual private networks and for remote user access through dial-up connection to private networks. A big advantage of IPsec is that security arrangements can be handled without requiring changes to individual user computers. Cisco has been a leader in proposing IPsec as a standard (or combination of standards and technologies) and has included support for it in its network routers. VPN Virtual Private Network or VPN is a type of network setup in which the public telecommunication medium and the public network, i.e. the Internet, is used to transmit data from one office at one geographical location to another office at another geographical location. IPsec used in VPN Below is the process that takes place during site-to-site communication over an IPsec VPN site- to-site tunnel: · The source computer C1 forwards the packet P1 with the destination IP address of the computer C2 to the router R1 (default gateway). · The router R1 receives the packet P1 and encrypts the entire packet using the specified algorithm. · After encrypting the packet, the router R1 encapsulates the whole packet to form a new packet NP1. This packet has IP address of R1 as source IP and the IP address of the router R2 (the router placed at the destination location) as the destination IP. · The router R1 then forwards the packet NP1 to the IP address of R2 using the Internet. · The destination router R2 receives the packet. · The router R2 decapsulates the NP1 to get the original packet P1. · The router R2 decrypts the packet P1 using the appropriate algorithm. · The router R2 then forwards the packet P1 to the destination computer C2, where the packet was actually supposed to reach. Advantages of Using IPsec VPN Site-to-Site Tunnels IPsec VPN site-to-site tunnels offer numerous advantages. Some of them are: · Requirement of buying dedicated expensive lease lines from one site to another is completely eliminated as public telecommunication lines are used to transmit data. · The internal IP addresses of both the participating networks and nodes remain hidden from each other and from the external users. · The entire communication between the source and destination sites remains encrypted which means that chances of information theft are extremely low. Disadvantages of IPsec VPN Site-to-Site Tunnels
  • 3. A few disadvantages of using IPsec VPN site-to-site tunnels are: · Expensive router is required at each site to play the role of the VPN server. · Since encapsulation, decapsulation, encryption and decryption takes place at the routers, these devices may face processing overhead and increased CPU utilization. Because of this, users may experience reduced communication speed. · The configuration process of IPsec VPN site-to-site is complex and requires highly skilled and qualified IT professionals to be hired to get the job done with perfection. Network layer currently suffers from attacks Network layer currently suffers from attacks are listed bellow Application layer Transport layer Network layer Data link layer How can IP Security be achieved? There are two specific headers that can be attached to IP packet to achieve security. They are the IP Authentication Header (AH) and the IP Encapsulating Security Payload (ESP) header. If confidentiality is not required, the Authentication Header (AH) alone can provide security (in this case, connectionless data integrity and data origin authentication) to IP datagram. The implementation can be host-host, host-gateway or gateway-gateway. But only host-host implementation is encouraged. The reason is that, in the case that security gateway provides security service for the trusted hosts behind the gateway, The security attack can still arise when the trusted hosts become untrusted. In other words the security can be violated for two communicating end user if the security (without confidentiality) does not cover completely the communicating path, but instead stop at the gateway, even though SA is established. Certainly in any kind of implementation, the untrusted systems (i.e., the systems that don't have the SA established) can't have the ability to attack data authentication ( always referring to both data integrity and data origin authentication) . The IP Encapsulating Security Payload (ESP) header provides integrity, authentication, and confidentiality to IP datagrams . It can provide a mix of optional security . ESP header can be applied alone, in combination with the IP Authentication Header(AH), or in a nested way, e. g. by using Tunnel-mode. The ESP header implementation can be host-host, host-gateway, or gateway-gateway. The ESP header is inserted after the IP header and before a higher-level protocol header(Transport-mode) or the encapsulated IP header(Tunnel-mode). Gateway-to-
  • 4. gateway ESP implementation, using encryption/decryption , is critical for building Private Virtual Networks (PVN) across an untrusted backbone in an open environment such as the Internet.