SlideShare a Scribd company logo
1 of 42
Internet Protocol Security
An Overview of IPSec
Outline:
 What Security Problem?
 Understanding TCP/IP.
 Security at What Level?
 IP Security.
 IPSec Security Services.
 Modes of operation.
 IPSec Security Protocols.
 Outbound/Inbound IPSec Processing.
 Real World Deployment Examples.
What Security Problem?
Today's Internet is primarily comprised of :
 Public
 Un-trusted
 Unreliable IP networks
Because of this inherent lack of security,
the Internet is subject to various types of
threats…
Internet Threats
 Data integrity
The contents of a packet can be accidentally or deliberately modified.
 Identity spoofing
The origin of an IP packet can be forged.
 Anti-reply attacks
Unauthorized data can be retransmitted.
 Loss of privacy
The contents of a packet can be examined in transit.
Understanding TCP/IP
OSI Reference Model
Application Layer
Transport Layer
Network Layer
Physical Layer
Presentation Layer
Session Layer
Logical Link Layer
TCP, UDP
IP
Network Adapter
Device Driver
Application
HTTP
SMTP
FTP
SNMP
NFS
FTP
DNS
Understanding TCP/IP
Encapsulation of Data for Network Delivery
Original
Message
Application Layer
Understanding TCP/IP
Encapsulation of Data for Network Delivery
Original
Message
Data 3
Application Layer
Transport Layer
(TCP, UDP)
Understanding TCP/IP
Encapsulation of Data for Network Delivery
Original
Message
Data 3
Header 3
Transport Layer
(TCP, UDP)
Application Layer
Understanding TCP/IP
Encapsulation of Data for Network Delivery
Original
Message
Data 3
Header 3
Data 2
Transport Layer
(TCP, UDP)
Network Layer
(IP)
Application Layer
Understanding TCP/IP
Encapsulation of Data for Network Delivery
Original
Message
Data 3
Header 3
Data 2
Header 2
Transport Layer
(TCP, UDP)
Network Layer
(IP)
Application Layer
Understanding TCP/IP
Encapsulation of Data for Network Delivery
Original
Message
Data 3
Header 3
Data 2
Header 2
Transport Layer
(TCP, UDP)
Network Layer
(IP)
Data 1
Application Layer
Data Link
Layer
Understanding TCP/IP
Encapsulation of Data for Network Delivery
Original
Message
Data 3
Header 3
Data 2
Header 2
Transport Layer
(TCP, UDP)
Network Layer
(IP)
Data 1
Header 1
Application Layer
Data Link
Layer
Understanding TCP/IP
Data 1
Header 1
Packet
Packet Sent by Host A
Data Link
Layer
Understanding TCP/IP
Network Layer
Data Link Layer
Packet Received by intermediary Router
Understanding TCP/IP
Data 1
Header 1
Packet
Packet Received by Host B
Data Link
Layer
Understanding TCP/IP
Data 1
Header 1
De-capsulation of Data from Network Delivery
Data Link
Layer
Understanding TCP/IP
De-capsulation of Data from Network Delivery
Data 1
Data Link
Layer
Understanding TCP/IP
De-capsulation of Data from Network Delivery
Data 2
Header 2
Network Layer
(IP)
Understanding TCP/IP
De-capsulation of Data from Network Delivery
Data 2
Network Layer
(IP)
Understanding TCP/IP
De-capsulation of Data from Network Delivery
Data 3
Header 3
Transport Layer
(TCP, UDP)
Understanding TCP/IP
De-capsulation of Data from Network Delivery
Data 3
Transport Layer
(TCP, UDP)
Understanding TCP/IP
De-capsulation of Data from Network Delivery
Original
Message
Application Layer
Understanding TCP/IP
De-capsulation of Data from Network Delivery
Original
Message
Application Layer
Security at What Level?
Application Layer
Transport Layer
Network Layer
Data Link Layer
PGP, Kerberos, SSH, etc.
Transport Layer Security (TLS)
IP Security
Hardware encryption
Security at Application Layer
(PGP, Kerberos, SSH, etc.)
 Implemented in end-hosts
 Advantages
- Extend application without involving operating system.
- Application can understand the data and can provide the appropriate
security.
 Disadvantages
- Security mechanisms have to be designed independently of each
application.
Security at Transport Layer
Transport Layer Security (TLS)
 Implemented in end-hosts
 Advantages
- Existing applications get security seamlessly
 Disadvantages
- Protocol specific
Security at Network Layer
IP Security (IPSec)
 Advantages
- Provides seamless security to application and transport layers (ULPs).
- Allows per flow or per connection security and thus allows for very
fine-grained security control.
 Disadvantages
- More difficult to to exercise on a per user basis on a multi-user
machine.
Security at Data Link Layer
 (Hardware encryption)
 Need a dedicated link between host/routers.
 Advantages
- Speed.
 Disadvantages
- Not scalable.
- Need dedicated links.
IP Security (IPSec)
 IPSec is a framework of open standards
developed by the Internet Engineering Task
Force (IETF).
Creates secure, authenticated, reliable
communications over IP networks
IPSec Security Services
 Connectionless integrity
Assurance that received traffic has not been
modified. Integrity includes anti-reply defenses.
 Data origin authentication
Assurance that traffic is sent by legitimate party or parties.
 Confidentiality (encryption)
Assurance that user’s traffic is not examined by non-
authorized parties.
 Access control
Prevention of unauthorized use of a resource.
IPSec Modes of Operation
 Transport Mode: protect the upper layer protocols
IP
Header
TCP
Header
Data
Original IP
Datagram
IP
Header
TCP
Header
IPSec
Header
Data
Transport Mode
protected packet
 Tunnel Mode: protect the entire IP payload
Tunnel Mode
protected packet
New IP
Header
TCP
Header
IPSec
Header
Data
Original IP
Header
protected
protected
Tunnel Mode
 Host-to-Network, Network-to-Network
Protected
Data
IPSec
IP Layer
SG
Internet
Transport
Layer
Application
Layer
IP
Layer
Host B
Protected
Data
IPSec
IP Layer
SG
Transport
Layer
Application
Layer
IP
Layer
Host A
SG = Security Gateway
Transport Mode
Transport Layer
Application Layer
 Host-to-Host
Transport Layer
Application Layer
IP Layer
Data Link Layer
IPSec
Host B
IP Layer
Data Link Layer
IPSec
Host A
IPSec Security Protocols
 Authentication Header (AH)
 Encapsulating Security Payload (ESP)
IPSec Security Protocols
 Authentication Header (AH) provides:
- Connectionless integrity
- Data origin authentication
- Protection against replay attacks
 Encapsulating Security Payload (ESP) provides:
- Confidentiality (encryption)
- Connectionless integrity
- Data origin authentication
- Protection against reply attacks
 Both protocols may be used alone or applied in
combination with each other.
Outbound/Inbound IPSec
Processing
 The inbound and the outbound IPSec
processing are completely independent.
Packet
SPD
IPSec policies
SAD
SPD = Security Policy Database
SAD = Security Association Database
SA = Security Association
Packet
Outbound IPSec Processing
1. Drop the packet.
2. Bypass IPSec.
3. Apply IPSec.
SAout
SPD
IPSec policies
Packet
Inbound IPSec Processing
Case 1:
If IPSec headers exists
1. Headers are processed.
2. SPD is consulted to
determine if the packet
can be admitted based on
the Sain.
SPD = Security Policy Database
SAD = Security Association Database
SA = Security Association
SPD
IPSec policies
Packet
Inbound IPSec Processing
Case 2:
If IPSec headers are absent
1. SPD is consulted to
determine the type of
service to afford this packet.
2. If certain traffic is required
to be IPSec protected and its
not it must be dropped.
SPD = Security Policy Database
SAD = Security Association Database
SA = Security Association
Real World Deployment
Examples
 VPNs
 Wireless
Internet
SG
Internet
Encrypted / Authenticated
Conclusion
 The Internet was not created with security in mind.
 Communications can be altered, examined and exploited.
 There is a growing need to protect private information crossing
the public networks that make up the Internet infrastructure.
 IPSec is a set of protocols and methodologies to create secure IP
connections.
Questions?

More Related Content

Similar to ip.ppt

IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
solimankellymattwe60
 
8 Authentication Security Protocols
8 Authentication Security Protocols8 Authentication Security Protocols
8 Authentication Security Protocols
guestfbf635
 
T C P I P Weaknesses And Solutions
T C P I P Weaknesses And SolutionsT C P I P Weaknesses And Solutions
T C P I P Weaknesses And Solutions
eroglu
 
IP Security in Network Security NS6
IP Security in Network Security NS6IP Security in Network Security NS6
IP Security in Network Security NS6
koolkampus
 

Similar to ip.ppt (20)

IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
 
Ipsec vpn v0.1
Ipsec vpn v0.1Ipsec vpn v0.1
Ipsec vpn v0.1
 
Network IP Security.pdf
Network IP Security.pdfNetwork IP Security.pdf
Network IP Security.pdf
 
IP Security
IP SecurityIP Security
IP Security
 
8 Authentication Security Protocols
8 Authentication Security Protocols8 Authentication Security Protocols
8 Authentication Security Protocols
 
Lec 9.pptx
Lec 9.pptxLec 9.pptx
Lec 9.pptx
 
Ip sec
Ip secIp sec
Ip sec
 
Websecurity
Websecurity Websecurity
Websecurity
 
CNS UNIT-VI.pptx
CNS UNIT-VI.pptxCNS UNIT-VI.pptx
CNS UNIT-VI.pptx
 
T C P I P Weaknesses And Solutions
T C P I P Weaknesses And SolutionsT C P I P Weaknesses And Solutions
T C P I P Weaknesses And Solutions
 
IS - SSL
IS - SSLIS - SSL
IS - SSL
 
IP Security in Network Security NS6
IP Security in Network Security NS6IP Security in Network Security NS6
IP Security in Network Security NS6
 
Ipsec
IpsecIpsec
Ipsec
 
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
 
Ipsecurity
IpsecurityIpsecurity
Ipsecurity
 
ESP.ppt
ESP.pptESP.ppt
ESP.ppt
 
I psecurity
I psecurityI psecurity
I psecurity
 
I psec
I psecI psec
I psec
 
Internet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography SystemInternet Protocol Security as the Network Cryptography System
Internet Protocol Security as the Network Cryptography System
 
Network security on Cisco routers and switches
Network security on Cisco routers and switchesNetwork security on Cisco routers and switches
Network security on Cisco routers and switches
 

Recently uploaded

Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
AnaAcapella
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
Peter Brusilovsky
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
中 央社
 

Recently uploaded (20)

How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17How to Send Pro Forma Invoice to Your Customers in Odoo 17
How to Send Pro Forma Invoice to Your Customers in Odoo 17
 
An Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge AppAn Overview of the Odoo 17 Knowledge App
An Overview of the Odoo 17 Knowledge App
 
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPSSpellings Wk 4 and Wk 5 for Grade 4 at CAPS
Spellings Wk 4 and Wk 5 for Grade 4 at CAPS
 
MOOD STABLIZERS DRUGS.pptx
MOOD     STABLIZERS           DRUGS.pptxMOOD     STABLIZERS           DRUGS.pptx
MOOD STABLIZERS DRUGS.pptx
 
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
24 ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH SỞ GIÁO DỤC HẢI DƯ...
 
SPLICE Working Group: Reusable Code Examples
SPLICE Working Group:Reusable Code ExamplesSPLICE Working Group:Reusable Code Examples
SPLICE Working Group: Reusable Code Examples
 
The Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDFThe Story of Village Palampur Class 9 Free Study Material PDF
The Story of Village Palampur Class 9 Free Study Material PDF
 
diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....diagnosting testing bsc 2nd sem.pptx....
diagnosting testing bsc 2nd sem.pptx....
 
Including Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdfIncluding Mental Health Support in Project Delivery, 14 May.pdf
Including Mental Health Support in Project Delivery, 14 May.pdf
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
Book Review of Run For Your Life Powerpoint
Book Review of Run For Your Life PowerpointBook Review of Run For Your Life Powerpoint
Book Review of Run For Your Life Powerpoint
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
ĐỀ THAM KHẢO KÌ THI TUYỂN SINH VÀO LỚP 10 MÔN TIẾNG ANH FORM 50 CÂU TRẮC NGHI...
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
An overview of the various scriptures in Hinduism
An overview of the various scriptures in HinduismAn overview of the various scriptures in Hinduism
An overview of the various scriptures in Hinduism
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文會考英文
 
UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024UChicago CMSC 23320 - The Best Commit Messages of 2024
UChicago CMSC 23320 - The Best Commit Messages of 2024
 
Observing-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptxObserving-Correct-Grammar-in-Making-Definitions.pptx
Observing-Correct-Grammar-in-Making-Definitions.pptx
 

ip.ppt

  • 1. Internet Protocol Security An Overview of IPSec
  • 2. Outline:  What Security Problem?  Understanding TCP/IP.  Security at What Level?  IP Security.  IPSec Security Services.  Modes of operation.  IPSec Security Protocols.  Outbound/Inbound IPSec Processing.  Real World Deployment Examples.
  • 3. What Security Problem? Today's Internet is primarily comprised of :  Public  Un-trusted  Unreliable IP networks Because of this inherent lack of security, the Internet is subject to various types of threats…
  • 4. Internet Threats  Data integrity The contents of a packet can be accidentally or deliberately modified.  Identity spoofing The origin of an IP packet can be forged.  Anti-reply attacks Unauthorized data can be retransmitted.  Loss of privacy The contents of a packet can be examined in transit.
  • 5. Understanding TCP/IP OSI Reference Model Application Layer Transport Layer Network Layer Physical Layer Presentation Layer Session Layer Logical Link Layer TCP, UDP IP Network Adapter Device Driver Application HTTP SMTP FTP SNMP NFS FTP DNS
  • 6. Understanding TCP/IP Encapsulation of Data for Network Delivery Original Message Application Layer
  • 7. Understanding TCP/IP Encapsulation of Data for Network Delivery Original Message Data 3 Application Layer Transport Layer (TCP, UDP)
  • 8. Understanding TCP/IP Encapsulation of Data for Network Delivery Original Message Data 3 Header 3 Transport Layer (TCP, UDP) Application Layer
  • 9. Understanding TCP/IP Encapsulation of Data for Network Delivery Original Message Data 3 Header 3 Data 2 Transport Layer (TCP, UDP) Network Layer (IP) Application Layer
  • 10. Understanding TCP/IP Encapsulation of Data for Network Delivery Original Message Data 3 Header 3 Data 2 Header 2 Transport Layer (TCP, UDP) Network Layer (IP) Application Layer
  • 11. Understanding TCP/IP Encapsulation of Data for Network Delivery Original Message Data 3 Header 3 Data 2 Header 2 Transport Layer (TCP, UDP) Network Layer (IP) Data 1 Application Layer Data Link Layer
  • 12. Understanding TCP/IP Encapsulation of Data for Network Delivery Original Message Data 3 Header 3 Data 2 Header 2 Transport Layer (TCP, UDP) Network Layer (IP) Data 1 Header 1 Application Layer Data Link Layer
  • 13. Understanding TCP/IP Data 1 Header 1 Packet Packet Sent by Host A Data Link Layer
  • 14. Understanding TCP/IP Network Layer Data Link Layer Packet Received by intermediary Router
  • 15. Understanding TCP/IP Data 1 Header 1 Packet Packet Received by Host B Data Link Layer
  • 16. Understanding TCP/IP Data 1 Header 1 De-capsulation of Data from Network Delivery Data Link Layer
  • 17. Understanding TCP/IP De-capsulation of Data from Network Delivery Data 1 Data Link Layer
  • 18. Understanding TCP/IP De-capsulation of Data from Network Delivery Data 2 Header 2 Network Layer (IP)
  • 19. Understanding TCP/IP De-capsulation of Data from Network Delivery Data 2 Network Layer (IP)
  • 20. Understanding TCP/IP De-capsulation of Data from Network Delivery Data 3 Header 3 Transport Layer (TCP, UDP)
  • 21. Understanding TCP/IP De-capsulation of Data from Network Delivery Data 3 Transport Layer (TCP, UDP)
  • 22. Understanding TCP/IP De-capsulation of Data from Network Delivery Original Message Application Layer
  • 23. Understanding TCP/IP De-capsulation of Data from Network Delivery Original Message Application Layer
  • 24. Security at What Level? Application Layer Transport Layer Network Layer Data Link Layer PGP, Kerberos, SSH, etc. Transport Layer Security (TLS) IP Security Hardware encryption
  • 25. Security at Application Layer (PGP, Kerberos, SSH, etc.)  Implemented in end-hosts  Advantages - Extend application without involving operating system. - Application can understand the data and can provide the appropriate security.  Disadvantages - Security mechanisms have to be designed independently of each application.
  • 26. Security at Transport Layer Transport Layer Security (TLS)  Implemented in end-hosts  Advantages - Existing applications get security seamlessly  Disadvantages - Protocol specific
  • 27. Security at Network Layer IP Security (IPSec)  Advantages - Provides seamless security to application and transport layers (ULPs). - Allows per flow or per connection security and thus allows for very fine-grained security control.  Disadvantages - More difficult to to exercise on a per user basis on a multi-user machine.
  • 28. Security at Data Link Layer  (Hardware encryption)  Need a dedicated link between host/routers.  Advantages - Speed.  Disadvantages - Not scalable. - Need dedicated links.
  • 29. IP Security (IPSec)  IPSec is a framework of open standards developed by the Internet Engineering Task Force (IETF). Creates secure, authenticated, reliable communications over IP networks
  • 30. IPSec Security Services  Connectionless integrity Assurance that received traffic has not been modified. Integrity includes anti-reply defenses.  Data origin authentication Assurance that traffic is sent by legitimate party or parties.  Confidentiality (encryption) Assurance that user’s traffic is not examined by non- authorized parties.  Access control Prevention of unauthorized use of a resource.
  • 31. IPSec Modes of Operation  Transport Mode: protect the upper layer protocols IP Header TCP Header Data Original IP Datagram IP Header TCP Header IPSec Header Data Transport Mode protected packet  Tunnel Mode: protect the entire IP payload Tunnel Mode protected packet New IP Header TCP Header IPSec Header Data Original IP Header protected protected
  • 32. Tunnel Mode  Host-to-Network, Network-to-Network Protected Data IPSec IP Layer SG Internet Transport Layer Application Layer IP Layer Host B Protected Data IPSec IP Layer SG Transport Layer Application Layer IP Layer Host A SG = Security Gateway
  • 33. Transport Mode Transport Layer Application Layer  Host-to-Host Transport Layer Application Layer IP Layer Data Link Layer IPSec Host B IP Layer Data Link Layer IPSec Host A
  • 34. IPSec Security Protocols  Authentication Header (AH)  Encapsulating Security Payload (ESP)
  • 35. IPSec Security Protocols  Authentication Header (AH) provides: - Connectionless integrity - Data origin authentication - Protection against replay attacks  Encapsulating Security Payload (ESP) provides: - Confidentiality (encryption) - Connectionless integrity - Data origin authentication - Protection against reply attacks  Both protocols may be used alone or applied in combination with each other.
  • 36. Outbound/Inbound IPSec Processing  The inbound and the outbound IPSec processing are completely independent. Packet
  • 37. SPD IPSec policies SAD SPD = Security Policy Database SAD = Security Association Database SA = Security Association Packet Outbound IPSec Processing 1. Drop the packet. 2. Bypass IPSec. 3. Apply IPSec. SAout
  • 38. SPD IPSec policies Packet Inbound IPSec Processing Case 1: If IPSec headers exists 1. Headers are processed. 2. SPD is consulted to determine if the packet can be admitted based on the Sain. SPD = Security Policy Database SAD = Security Association Database SA = Security Association
  • 39. SPD IPSec policies Packet Inbound IPSec Processing Case 2: If IPSec headers are absent 1. SPD is consulted to determine the type of service to afford this packet. 2. If certain traffic is required to be IPSec protected and its not it must be dropped. SPD = Security Policy Database SAD = Security Association Database SA = Security Association
  • 40. Real World Deployment Examples  VPNs  Wireless Internet SG Internet Encrypted / Authenticated
  • 41. Conclusion  The Internet was not created with security in mind.  Communications can be altered, examined and exploited.  There is a growing need to protect private information crossing the public networks that make up the Internet infrastructure.  IPSec is a set of protocols and methodologies to create secure IP connections.