SlideShare a Scribd company logo
1 of 17
1
IP Security
Part - 2
Mr. RAJASEKAR RAMALINGAM
Faculty - Department of IT, College of Applied Sciences – Sur,
Post Box: 484 Post Code: 411, Sultanate of Oman.
vrrsekar@yahoo.com
2
Presentation Path
1. IPSEC MODES OF OPERATION
2. IPSec Implementation Options
3. IPSec Mandatory Algorithms
4. Security Association
5. ISAKMP SA
6. Security Parameter index (SPI)
7. Selectors
8. SA Database (SAD)
9. Security Policy Database (SPD)
3
1. IPSEC MODES OF OPERATION
1. TRANSPORT MODE
a) AH Protection for upper layer protocols and
selective IP header fields
b) In this mode, ESP does not protect IP header
c) Used for host-to-host connection; Gateways
acting as host can use for network management
2. TUNNEL MODE
a) Protects the entire IP datagram
b) Source and destination IP address are often
different from those in the header of the original
datagram.
c) Generally used between two gateways; but can be
used between hosts
4
IPSec Tunnel Mode
IPSec Tunnel Mode
Host 1
IPSec Tunnel Mode Host 2
Gateway 1 Gateway 2
SSL and IPSec Transport Mode
IPSec Tunnel Mode Most popular and appropriate
security solution in the data plane
Transport and Tunnel Mode
5
IPsec Tunnel Mode vs. Transport Mode
TunnelModeTransportMode
Orig IP
Header
Orig IP
Header
IPSec
header
IPSec
header TCP header
TCP header
Data
Data
IPSec
header
IPSec
header
Orig IP
Header
Orig IP
Header TCP header
TCP header
Data
Data
Insecure
Network
Insecure
Network
Original
Media Access
Payload
Original IP
Media Access
Payload
Original IP
TCP/IP
Payload
Media Access
ESP(Security)
Original IP
TCP/IP
Original IP
Media Access
ESP(Security)
Tunnel IP
Payload
Media Access
Original IP
Tunnel IP
Payload
6
2. IPSec Implementation Options
1. END HOST
a) A Native Stack: IPSEC tunnel and transport
modes are directly integrated into IP stack by OS
vendors
b) A Replacement Stack: A third party vendor writes
entire drop-in replacement for original stack
c) A bump in the stack: IPSEC will be inserted into
the native stack
2. GATEWAY
a) A bump in the wire: Encrypting unit transparent to
other network devices
b) Integrated Gateway: Provides enhancements to IP
router or firewall.
7
3. IPSec Mandatory Algorithms
* DES in CBC mode
* HMAC with MD5
* HMAC with SHA-1
* NULL Authentication algorithm
* NULL Encryption algorithm
8
4. Security Association
c) A typical SA Record will have
> Authentication and Encryption keys
> Algorithms and modes
> Key life times
> Initialisation Vectors
> Source IP Addresses
a) SA contains information about authentication,
encryption and associated keys
b) SA is identified with SPI, destination IP address and
security protocol
9
5. ISAKMP SA
• For VPN connection, ISAKMP negotiates terms and
conditions of communication to authenticate and
share connection properties
• ISAKMP uses cookies for maintaining the SA
• ISAKMP SAs are duplex and caters for two systems
10
IPSec SA
• IPSec SA is defined with three components:
1. SPI
2. Destination IP Address
3. Security protocol identifier (50 or 51)
• SA are managed by SAD and SPD
• IPSec SA is simplex and requires two SAs between
two systems
• SPD uses selectors to map traffic to a policy, which
ultimately maps to an SA that is maintained in the
SAD
11
IPSEC SA Example
SPI 2916
AH Algorithm Mode Keyed
AH Transform RFC 1828
AH Algorithm MD5
AH Key(s) 128-bit MD5 key
AH Mode Entire Datagram
ESP Algorithm DES
ESP Algorithm Mode CBC
ESP Mode Transport
ESP Synch/Init Vector Size 64
ESP Transfrom RFC 1829
ESP Key(s) 56-bit DES Key
Lifetime
Absolute time in
UNIX format
12
6. Security Parameter index (SPI)
 SPI allows multiplexing of SAs to a single gateway
SPI enables to map the incoming packet to an SA
SPI distinguishes different SAs terminating at the
same destination with same IPSec protocol
SPI provides a mechanism for identifying the first
SA that applies to the particular packet.
Selectors are used further identification of SA
13
7. Selectors
2) A selector identifies an attribute of the
communication to determine the alignment with an
SA or SAs
3) The information in the selectors can be destination
IP address, source IP address, upper layer protocols
and service ports
1) IP traffic is mapped to IPSec policies by selectors
4) In tunnel mode, selectors information is obtained
after processing the ESP with SA information
5) In transport mode, there is no inner IP header
information and original SPD information is used.
14
8. SA Database (SAD)
• Each SA has an entry in the SAD and SA entries are indexed
as destination IP address, IPSec protocol and SPI
• SAD contains nine parameters:
1. Sequence number counter for outbound packet
2. Sequence number overflow counter
3. A 32-bit anti-replay window
4. Life time of the SA
5. The algorithms used in the AH and associated key
6. The algorithms used in the authenticating portion of the ESP header
7. The algorithm used in the encryption of the ESP and its associated key
8. IPSec modes of operation: transport or tunnel
9. Path MTU
15
9. Security Policy Database (SPD)
• IPSec allows different policies for different users
• Policies are maintained in a Security Policy Database
• SPD defines the following actions
1) Discard - do not let this packet in or out
2) Bypass - do not apply security services on these
packets
3) Apply - apply security services on outbound packets
and check for security on inbound packets.
• IP traffic is mapped to IPSec policy by selectors.
 Destination IP address, Source IP address, name,
upper layer protocol, destination and source ports
and data sensitivity level.
16
IPSEC SPD Example
IP Source Address 128-bit Ipv6 address Value
Protocol TCP
SPI 2916
IP Destination Address 128-bit Ipv6 address Value
UserID UNIX UID
TCP/UDP Destination port 23
TCP/UDP Source port 1234
17
Thank you

More Related Content

What's hot (18)

Ipsec
IpsecIpsec
Ipsec
 
Ip security
Ip security Ip security
Ip security
 
Ip Sec
Ip SecIp Sec
Ip Sec
 
Ipsec
IpsecIpsec
Ipsec
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
 
IP Sec by Amin Pathan
IP Sec by Amin PathanIP Sec by Amin Pathan
IP Sec by Amin Pathan
 
ip security
ip securityip security
ip security
 
IP Security
IP SecurityIP Security
IP Security
 
IPSec Overview
IPSec OverviewIPSec Overview
IPSec Overview
 
Keymanagement of ipsec
Keymanagement of ipsecKeymanagement of ipsec
Keymanagement of ipsec
 
BAIT1103 Chapter 6
BAIT1103 Chapter 6BAIT1103 Chapter 6
BAIT1103 Chapter 6
 
Pertemuan 9 intrusion detection system
Pertemuan 9 intrusion detection systemPertemuan 9 intrusion detection system
Pertemuan 9 intrusion detection system
 
IP Security
IP SecurityIP Security
IP Security
 
Ip Sec
Ip SecIp Sec
Ip Sec
 
IP Security
IP SecurityIP Security
IP Security
 
IPSec_VPN_Final_
IPSec_VPN_Final_IPSec_VPN_Final_
IPSec_VPN_Final_
 
IPsec for IMS
IPsec for IMSIPsec for IMS
IPsec for IMS
 
Internet protocol security
Internet protocol securityInternet protocol security
Internet protocol security
 

Similar to IP Security Part 2

Similar to IP Security Part 2 (20)

IS Unit-4 .ppt
IS Unit-4 .pptIS Unit-4 .ppt
IS Unit-4 .ppt
 
18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security18CS2005 Cryptography and Network Security
18CS2005 Cryptography and Network Security
 
Lecture14..pdf
Lecture14..pdfLecture14..pdf
Lecture14..pdf
 
IP SEC.ptx
IP SEC.ptxIP SEC.ptx
IP SEC.ptx
 
ESP.ppt
ESP.pptESP.ppt
ESP.ppt
 
IP Security
IP SecurityIP Security
IP Security
 
Ip sec
Ip secIp sec
Ip sec
 
Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
 
[removed]Cryptography and Network Security Principles a.docx
[removed]Cryptography and Network Security Principles a.docx[removed]Cryptography and Network Security Principles a.docx
[removed]Cryptography and Network Security Principles a.docx
 
Chapter 6.ppt
Chapter 6.pptChapter 6.ppt
Chapter 6.ppt
 
Chapter 6 (1).ppt
Chapter 6 (1).pptChapter 6 (1).ppt
Chapter 6 (1).ppt
 
Chapter 6 (1).ppt
Chapter 6 (1).pptChapter 6 (1).ppt
Chapter 6 (1).ppt
 
05 06 ike
05   06 ike05   06 ike
05 06 ike
 
Cyber forensics
Cyber forensicsCyber forensics
Cyber forensics
 
ICS PPT Unit 4.ppt
ICS PPT Unit 4.pptICS PPT Unit 4.ppt
ICS PPT Unit 4.ppt
 
Network Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. ShivashankarNetwork Security_3rd Module_Dr. Shivashankar
Network Security_3rd Module_Dr. Shivashankar
 
Ipsec vpn v0.1
Ipsec vpn v0.1Ipsec vpn v0.1
Ipsec vpn v0.1
 
Eigrp Summary (Ccna4.Com)
Eigrp Summary  (Ccna4.Com)Eigrp Summary  (Ccna4.Com)
Eigrp Summary (Ccna4.Com)
 
Arp config-arp
Arp config-arpArp config-arp
Arp config-arp
 
Go3611771182
Go3611771182Go3611771182
Go3611771182
 

More from CAS

CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCAS
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4CAS
 
RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2CAS
 
RRB JE Stage 2 Computer and Applications Questions Part 1
RRB JE Stage 2 Computer and Applications  Questions Part 1RRB JE Stage 2 Computer and Applications  Questions Part 1
RRB JE Stage 2 Computer and Applications Questions Part 1CAS
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT SecurityCAS
 
Introduction to research methodology
Introduction to research methodologyIntroduction to research methodology
Introduction to research methodologyCAS
 
Can you solve this
Can you solve thisCan you solve this
Can you solve thisCAS
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentialityCAS
 
Public key cryptography and message authentication
Public key cryptography and message authenticationPublic key cryptography and message authentication
Public key cryptography and message authenticationCAS
 
Malicious software
Malicious softwareMalicious software
Malicious softwareCAS
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspectsCAS
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessmentCAS
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and proceduresCAS
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detectionCAS
 
Human resources security
Human resources securityHuman resources security
Human resources securityCAS
 
Database security
Database securityDatabase security
Database securityCAS
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic toolsCAS
 
Growth of Human Communication systems
Growth of Human Communication systemsGrowth of Human Communication systems
Growth of Human Communication systemsCAS
 

More from CAS (20)

CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs CollectionCCNA 200-301 IPv6 addressing and subnetting MCQs Collection
CCNA 200-301 IPv6 addressing and subnetting MCQs Collection
 
RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5RRB JE Stage 2 Computer and Applications Questions Part 5
RRB JE Stage 2 Computer and Applications Questions Part 5
 
RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4RRB JE Stage 2 Computer and Applications Questions Part 4
RRB JE Stage 2 Computer and Applications Questions Part 4
 
RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3RRB JE Stage 2 Computer and Applications Questions part 3
RRB JE Stage 2 Computer and Applications Questions part 3
 
RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2
 
RRB JE Stage 2 Computer and Applications Questions Part 1
RRB JE Stage 2 Computer and Applications  Questions Part 1RRB JE Stage 2 Computer and Applications  Questions Part 1
RRB JE Stage 2 Computer and Applications Questions Part 1
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Introduction to research methodology
Introduction to research methodologyIntroduction to research methodology
Introduction to research methodology
 
Can you solve this
Can you solve thisCan you solve this
Can you solve this
 
Symmetric encryption and message confidentiality
Symmetric encryption and message confidentialitySymmetric encryption and message confidentiality
Symmetric encryption and message confidentiality
 
Public key cryptography and message authentication
Public key cryptography and message authenticationPublic key cryptography and message authentication
Public key cryptography and message authentication
 
Malicious software
Malicious softwareMalicious software
Malicious software
 
Legal and ethical aspects
Legal and ethical aspectsLegal and ethical aspects
Legal and ethical aspects
 
IT Security management and risk assessment
IT Security management and risk assessmentIT Security management and risk assessment
IT Security management and risk assessment
 
It security controls, plans, and procedures
It security controls, plans, and proceduresIt security controls, plans, and procedures
It security controls, plans, and procedures
 
Intrusion detection
Intrusion detectionIntrusion detection
Intrusion detection
 
Human resources security
Human resources securityHuman resources security
Human resources security
 
Database security
Database securityDatabase security
Database security
 
Cryptographic tools
Cryptographic toolsCryptographic tools
Cryptographic tools
 
Growth of Human Communication systems
Growth of Human Communication systemsGrowth of Human Communication systems
Growth of Human Communication systems
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 

IP Security Part 2

  • 1. 1 IP Security Part - 2 Mr. RAJASEKAR RAMALINGAM Faculty - Department of IT, College of Applied Sciences – Sur, Post Box: 484 Post Code: 411, Sultanate of Oman. vrrsekar@yahoo.com
  • 2. 2 Presentation Path 1. IPSEC MODES OF OPERATION 2. IPSec Implementation Options 3. IPSec Mandatory Algorithms 4. Security Association 5. ISAKMP SA 6. Security Parameter index (SPI) 7. Selectors 8. SA Database (SAD) 9. Security Policy Database (SPD)
  • 3. 3 1. IPSEC MODES OF OPERATION 1. TRANSPORT MODE a) AH Protection for upper layer protocols and selective IP header fields b) In this mode, ESP does not protect IP header c) Used for host-to-host connection; Gateways acting as host can use for network management 2. TUNNEL MODE a) Protects the entire IP datagram b) Source and destination IP address are often different from those in the header of the original datagram. c) Generally used between two gateways; but can be used between hosts
  • 4. 4 IPSec Tunnel Mode IPSec Tunnel Mode Host 1 IPSec Tunnel Mode Host 2 Gateway 1 Gateway 2 SSL and IPSec Transport Mode IPSec Tunnel Mode Most popular and appropriate security solution in the data plane Transport and Tunnel Mode
  • 5. 5 IPsec Tunnel Mode vs. Transport Mode TunnelModeTransportMode Orig IP Header Orig IP Header IPSec header IPSec header TCP header TCP header Data Data IPSec header IPSec header Orig IP Header Orig IP Header TCP header TCP header Data Data Insecure Network Insecure Network Original Media Access Payload Original IP Media Access Payload Original IP TCP/IP Payload Media Access ESP(Security) Original IP TCP/IP Original IP Media Access ESP(Security) Tunnel IP Payload Media Access Original IP Tunnel IP Payload
  • 6. 6 2. IPSec Implementation Options 1. END HOST a) A Native Stack: IPSEC tunnel and transport modes are directly integrated into IP stack by OS vendors b) A Replacement Stack: A third party vendor writes entire drop-in replacement for original stack c) A bump in the stack: IPSEC will be inserted into the native stack 2. GATEWAY a) A bump in the wire: Encrypting unit transparent to other network devices b) Integrated Gateway: Provides enhancements to IP router or firewall.
  • 7. 7 3. IPSec Mandatory Algorithms * DES in CBC mode * HMAC with MD5 * HMAC with SHA-1 * NULL Authentication algorithm * NULL Encryption algorithm
  • 8. 8 4. Security Association c) A typical SA Record will have > Authentication and Encryption keys > Algorithms and modes > Key life times > Initialisation Vectors > Source IP Addresses a) SA contains information about authentication, encryption and associated keys b) SA is identified with SPI, destination IP address and security protocol
  • 9. 9 5. ISAKMP SA • For VPN connection, ISAKMP negotiates terms and conditions of communication to authenticate and share connection properties • ISAKMP uses cookies for maintaining the SA • ISAKMP SAs are duplex and caters for two systems
  • 10. 10 IPSec SA • IPSec SA is defined with three components: 1. SPI 2. Destination IP Address 3. Security protocol identifier (50 or 51) • SA are managed by SAD and SPD • IPSec SA is simplex and requires two SAs between two systems • SPD uses selectors to map traffic to a policy, which ultimately maps to an SA that is maintained in the SAD
  • 11. 11 IPSEC SA Example SPI 2916 AH Algorithm Mode Keyed AH Transform RFC 1828 AH Algorithm MD5 AH Key(s) 128-bit MD5 key AH Mode Entire Datagram ESP Algorithm DES ESP Algorithm Mode CBC ESP Mode Transport ESP Synch/Init Vector Size 64 ESP Transfrom RFC 1829 ESP Key(s) 56-bit DES Key Lifetime Absolute time in UNIX format
  • 12. 12 6. Security Parameter index (SPI)  SPI allows multiplexing of SAs to a single gateway SPI enables to map the incoming packet to an SA SPI distinguishes different SAs terminating at the same destination with same IPSec protocol SPI provides a mechanism for identifying the first SA that applies to the particular packet. Selectors are used further identification of SA
  • 13. 13 7. Selectors 2) A selector identifies an attribute of the communication to determine the alignment with an SA or SAs 3) The information in the selectors can be destination IP address, source IP address, upper layer protocols and service ports 1) IP traffic is mapped to IPSec policies by selectors 4) In tunnel mode, selectors information is obtained after processing the ESP with SA information 5) In transport mode, there is no inner IP header information and original SPD information is used.
  • 14. 14 8. SA Database (SAD) • Each SA has an entry in the SAD and SA entries are indexed as destination IP address, IPSec protocol and SPI • SAD contains nine parameters: 1. Sequence number counter for outbound packet 2. Sequence number overflow counter 3. A 32-bit anti-replay window 4. Life time of the SA 5. The algorithms used in the AH and associated key 6. The algorithms used in the authenticating portion of the ESP header 7. The algorithm used in the encryption of the ESP and its associated key 8. IPSec modes of operation: transport or tunnel 9. Path MTU
  • 15. 15 9. Security Policy Database (SPD) • IPSec allows different policies for different users • Policies are maintained in a Security Policy Database • SPD defines the following actions 1) Discard - do not let this packet in or out 2) Bypass - do not apply security services on these packets 3) Apply - apply security services on outbound packets and check for security on inbound packets. • IP traffic is mapped to IPSec policy by selectors.  Destination IP address, Source IP address, name, upper layer protocol, destination and source ports and data sensitivity level.
  • 16. 16 IPSEC SPD Example IP Source Address 128-bit Ipv6 address Value Protocol TCP SPI 2916 IP Destination Address 128-bit Ipv6 address Value UserID UNIX UID TCP/UDP Destination port 23 TCP/UDP Source port 1234