SlideShare a Scribd company logo
IPSec
ASIM SHARIF SATTI
2
Cryptographic System
Secure Shell
Secure Shell (SSH) functions as a type of tunneling
mechanism that provides terminal-like access to remote
computers.
SSH is a program and a protocol that can be used to log into
another computer over a network.
SSH provides authentication and secure transmission over
vulnerable channels like the Internet.
SSH is a program and a set of protocols that work together to
provide a secure tunnel between two computers.
For example, the program can let Paul, who is on computer A,
access computer B’s files, run applications on computer B, and
retrieve files from computer B without ever physically touching
that computer.
Secure Shell
SSH should be used instead of Telnet, FTP etc, which
provide the same type of functionality SSH offers but
in a much less secure manner.
The two computers go through a handshaking
process and exchange (via Diffie-Hellman) a session
key that will be used during the session to encrypt
and protect the data sent. The steps of an SSH
connection are outlined in the Figure.
Once the handshake takes place and a secure channel is
established, the two computers have a pathway to exchange data
with the assurance that the information will be encrypted and its
integrity will be protected.
Shon
Harris
Copyright Pearson Prentice-
Hall 2010
6
3.19.7 Virtual Private Networks (VPNs)
3 types
Intranet – Within an organization
Extranet – Outside an organization
Remote Access – Employee to Business
Four Protocols used in VPN
PPTP -- Point-to-Point Tunneling Protocol
L2TP -- Layer 2 Tunneling Protocol
IPsec -- Internet Protocol Security
SOCKS – is not used as much as the ones
above
3.19.8 IPSEC (Internet Protocol Security)
The Internet Protocol Security (IPSec) protocol suite
provides a method of setting up a secure channel for
protected data exchange between two devices. The
devices that share this secure channel can be two
servers, two routers, a workstation and a server, or
two gateways between different networks.
IPSec is a widely accepted standard for providing
network layer protection. It can be more flexible and
less expensive than end-to-end and link encryption
methods.
IPSEC (Internet Protocol Security)
IPSec has strong encryption and authentication
methods, and although it can be used to enable
tunneled communication between two computers, it
is usually employed to establish virtual private
networks (VPNs) among networks across the
Internet.
IPSec is not a strict protocol that dictates the type of
algorithm, keys, and authentication method to use.
Rather, it is an open, modular framework that
provides a lot of flexibility for companies when they
choose to use this type of technology.
IPSEC (Internet Protocol Security)
IPSec uses two basic security protocols:
Authentication Header (AH) and
Encapsulating Security Payload (ESP).
AH is the authenticating protocol, and
ESP is an authenticating and encrypting protocol that
uses cryptographic mechanisms to provide source
authentication, confidentiality, and message integrity.
IPSEC (Internet Protocol Security)
IPSec can work in one of two modes:
transport mode, in which the payload of the message
is protected, and
tunnel mode, in which the payload and the routing
and header information are protected.
In transport mode encrypts the actual message
information so it cannot be sniffed and uncovered by
an unauthorized entity. Tunnel mode provides a
higher level of protection by also protecting the
header and trailer data an attacker may find useful.
Raymond Panko
12
IPsec Encapsulating Security Payload (ESP) Header and Trailer in
Transport and Tunnel Modes
Raymond Panko
13
IPsec Operation: Transport Mode
1.
End-to-End
Security
(Good)
2.
Security in
Site Network
(Good)
3.
Setup Cost
On Each Host
(Costly)
Copyright Pearson Prentice-
Hall 2010
14
IPsec Operation: Tunnel Mode
2.
No Security in
Site Network
(Bad)
3.
No Setup Cost
On Each Host
(Good)
Raymond Panko
Copyright Pearson Prentice-
Hall 2010
15
Comparing IPsec Transport and Tunnel Modes
Characteristic Transport Mode Tunnel Mode
Uses an IPsec VPN
Gateway?
No Yes
Cryptographic
Protection
All the way from the
source host to the
destination host,
including the Internet
and the two site
networks.
Only over the Internet
between the IPsec
gateways. Not within
the two site networks.
Setup Costs High. Setup requires
the creation of a digital
certificate for each
client and significant
configuration work.
Low. Only the IPsec
gateways must
implement IPsec, so
only they need digital
certificates and need to
be configured.
Raymond Panko
The Figure shows the high-level view of the steps of
setting up an IPSec connection.
SA- A Security Association (SA) is the establishment of
shared security attributes between two network entities to
support secure communication. An SA may include attributes such as:
cryptographic algorithm and mode; traffic encryption key; and
parameters for the network data to be passed over the connection.
Each device will have at least one security association
(SA) for each secure connection it uses. The SA, which
is critical to the IPSec architecture, is a record of the
configurations the device needs to support an IPSec
connection.
When two devices complete their handshaking
process, which means they have agreed upon a long
list of parameters they will use to communicate,
these data must be recorded and stored
somewhere, which is in the SA. The SA can contain
the authentication and encryption keys, the agreed-
upon algorithms, the key lifetime, and the source IP
address.
IPSEC (Internet Protocol Security)
Raymond Panko
18
IPsec Security Associations
When a device receives a packet via the IPSec protocol, it is
the SA that tells the device what to do with the packet. So if
device B receives a packet from device C via IPSec, device B
will look to the corresponding SA to tell it how to decrypt the
packet, how to properly authenticate the source of the packet,
which key to use, and how to reply to the message if
necessary.
SAs are directional, so a device will have one SA for
outbound traffic and a different SA for inbound
traffic for each individual communication channel. If
a device is connecting to three devices, it will have at
least six SAs, one for each inbound and outbound
connection per remote device.
IPSEC (Internet Protocol Security)
So how can a device keep all of these SAs organized
and ensure that the right SA is invoked for the right
connection?
With the mighty security parameter index (SPI), that’s
how.
Each device has an SPI that keeps track of the different SAs
and tells the device which one is appropriate to invoke for the
different packets it receives.
The SPI value is in the header of an IPSec packet, and the
device reads this value to tell it which SA to consult, as
depicted in the Figure.
IPSEC (Internet Protocol Security)
IPSec can authenticate the sending devices of the
packet by using MAC.
The ESP protocol can provide authentication,
integrity, and confidentiality if the devices are
configured for this type of functionality.
if a company just needs to make sure it knows the
source of the sender and must be assured of the
integrity of the packets, it would choose to use AH.
IPSEC (Internet Protocol Security)
If the company would like to use these
services and also have confidentiality, it
would use the ESP protocol because it
provides encryption functionality. In most
cases, the reason ESP is employed is because
the company must set up a secure VPN
connection.
IPSEC (Internet Protocol Security)

More Related Content

Similar to Network security Slides fir bs-13.PPT.pptx

Ipsec vpn v0.1
Ipsec vpn v0.1Ipsec vpn v0.1
Ch16
Ch16Ch16
Unit 5
Unit 5Unit 5
Cn36539543
Cn36539543Cn36539543
Cn36539543
IJERA Editor
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
solimankellymattwe60
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
PriyadharshiniVS
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
priyanka Garg
 
Ip Security.pptx
Ip Security.pptxIp Security.pptx
Ip Security.pptx
TouseeqHaider11
 
Ip sec
Ip secIp sec
Network security
Network securityNetwork security
Network security
anoop negi
 
I psec cisco
I psec ciscoI psec cisco
I psec cisco
Deepak296
 
Lecture14..pdf
Lecture14..pdfLecture14..pdf
Lecture14..pdf
AlaaElhaddad3
 
Lec 9.pptx
Lec 9.pptxLec 9.pptx
Lec 9.pptx
ssuserbab2f4
 
A secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creationA secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creation
JPINFOTECH JAYAPRAKASH
 
IP Security
IP SecurityIP Security
IP Security
Ambo University
 
Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329
Editor IJARCET
 
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKA NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
ijmnct
 
Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommerce
priyanka Garg
 
A technical comparison of ip sec and ssl 2005
A technical comparison of ip sec and ssl  2005A technical comparison of ip sec and ssl  2005
A technical comparison of ip sec and ssl 2005
Nadeer Abu Jraerr
 
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
n|u - The Open Security Community
 

Similar to Network security Slides fir bs-13.PPT.pptx (20)

Ipsec vpn v0.1
Ipsec vpn v0.1Ipsec vpn v0.1
Ipsec vpn v0.1
 
Ch16
Ch16Ch16
Ch16
 
Unit 5
Unit 5Unit 5
Unit 5
 
Cn36539543
Cn36539543Cn36539543
Cn36539543
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 
Ecommerce final ppt
Ecommerce final pptEcommerce final ppt
Ecommerce final ppt
 
Ip Security.pptx
Ip Security.pptxIp Security.pptx
Ip Security.pptx
 
Ip sec
Ip secIp sec
Ip sec
 
Network security
Network securityNetwork security
Network security
 
I psec cisco
I psec ciscoI psec cisco
I psec cisco
 
Lecture14..pdf
Lecture14..pdfLecture14..pdf
Lecture14..pdf
 
Lec 9.pptx
Lec 9.pptxLec 9.pptx
Lec 9.pptx
 
A secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creationA secure protocol for spontaneous wireless ad hoc networks creation
A secure protocol for spontaneous wireless ad hoc networks creation
 
IP Security
IP SecurityIP Security
IP Security
 
Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329Ijarcet vol-2-issue-4-1322-1329
Ijarcet vol-2-issue-4-1322-1329
 
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORKA NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
A NEW COMMUNICATION PLATFORM FOR DATA TRANSMISSION IN VIRTUAL PRIVATE NETWORK
 
Final ppt ecommerce
Final ppt ecommerceFinal ppt ecommerce
Final ppt ecommerce
 
A technical comparison of ip sec and ssl 2005
A technical comparison of ip sec and ssl  2005A technical comparison of ip sec and ssl  2005
A technical comparison of ip sec and ssl 2005
 
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
 

Recently uploaded

SQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure MalaysiaSQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure Malaysia
GohKiangHock
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
Grant Fritchey
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
Bert Jan Schrijver
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
XfilesPro
 
What next after learning python programming basics
What next after learning python programming basicsWhat next after learning python programming basics
What next after learning python programming basics
Rakesh Kumar R
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
Green Software Development
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
Quickdice ERP
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
Rakesh Kumar R
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Julian Hyde
 
SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
Yara Milbes
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !
Marcin Chrost
 
Requirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional SafetyRequirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional Safety
Ayan Halder
 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
Alina Yurenko
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
Green Software Development
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
dakas1
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
Łukasz Chruściel
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
ToXSL Technologies
 
zOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL DifferenceszOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL Differences
YousufSait3
 

Recently uploaded (20)

SQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure MalaysiaSQL Accounting Software Brochure Malaysia
SQL Accounting Software Brochure Malaysia
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
 
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
J-Spring 2024 - Going serverless with Quarkus, GraalVM native images and AWS ...
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
 
What next after learning python programming basics
What next after learning python programming basicsWhat next after learning python programming basics
What next after learning python programming basics
 
Energy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina JonuziEnergy consumption of Database Management - Florina Jonuzi
Energy consumption of Database Management - Florina Jonuzi
 
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesE-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian Companies
 
How to write a program in any programming language
How to write a program in any programming languageHow to write a program in any programming language
How to write a program in any programming language
 
Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)Measures in SQL (SIGMOD 2024, Santiago, Chile)
Measures in SQL (SIGMOD 2024, Santiago, Chile)
 
SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !Enums On Steroids - let's look at sealed classes !
Enums On Steroids - let's look at sealed classes !
 
Requirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional SafetyRequirement Traceability in Xen Functional Safety
Requirement Traceability in Xen Functional Safety
 
All you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVMAll you need to know about Spring Boot and GraalVM
All you need to know about Spring Boot and GraalVM
 
GreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-JurisicGreenCode-A-VSCode-Plugin--Dario-Jurisic
GreenCode-A-VSCode-Plugin--Dario-Jurisic
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
一比一原版(UMN毕业证)明尼苏达大学毕业证如何办理
 
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf2024 eCommerceDays Toulouse - Sylius 2.0.pdf
2024 eCommerceDays Toulouse - Sylius 2.0.pdf
 
How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?How Can Hiring A Mobile App Development Company Help Your Business Grow?
How Can Hiring A Mobile App Development Company Help Your Business Grow?
 
zOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL DifferenceszOS Mainframe JES2-JES3 JCL-JECL Differences
zOS Mainframe JES2-JES3 JCL-JECL Differences
 

Network security Slides fir bs-13.PPT.pptx

  • 3. Secure Shell Secure Shell (SSH) functions as a type of tunneling mechanism that provides terminal-like access to remote computers. SSH is a program and a protocol that can be used to log into another computer over a network. SSH provides authentication and secure transmission over vulnerable channels like the Internet. SSH is a program and a set of protocols that work together to provide a secure tunnel between two computers. For example, the program can let Paul, who is on computer A, access computer B’s files, run applications on computer B, and retrieve files from computer B without ever physically touching that computer.
  • 4. Secure Shell SSH should be used instead of Telnet, FTP etc, which provide the same type of functionality SSH offers but in a much less secure manner. The two computers go through a handshaking process and exchange (via Diffie-Hellman) a session key that will be used during the session to encrypt and protect the data sent. The steps of an SSH connection are outlined in the Figure.
  • 5. Once the handshake takes place and a secure channel is established, the two computers have a pathway to exchange data with the assurance that the information will be encrypted and its integrity will be protected. Shon Harris
  • 6. Copyright Pearson Prentice- Hall 2010 6 3.19.7 Virtual Private Networks (VPNs) 3 types Intranet – Within an organization Extranet – Outside an organization Remote Access – Employee to Business
  • 7. Four Protocols used in VPN PPTP -- Point-to-Point Tunneling Protocol L2TP -- Layer 2 Tunneling Protocol IPsec -- Internet Protocol Security SOCKS – is not used as much as the ones above
  • 8. 3.19.8 IPSEC (Internet Protocol Security) The Internet Protocol Security (IPSec) protocol suite provides a method of setting up a secure channel for protected data exchange between two devices. The devices that share this secure channel can be two servers, two routers, a workstation and a server, or two gateways between different networks. IPSec is a widely accepted standard for providing network layer protection. It can be more flexible and less expensive than end-to-end and link encryption methods.
  • 9. IPSEC (Internet Protocol Security) IPSec has strong encryption and authentication methods, and although it can be used to enable tunneled communication between two computers, it is usually employed to establish virtual private networks (VPNs) among networks across the Internet. IPSec is not a strict protocol that dictates the type of algorithm, keys, and authentication method to use. Rather, it is an open, modular framework that provides a lot of flexibility for companies when they choose to use this type of technology.
  • 10. IPSEC (Internet Protocol Security) IPSec uses two basic security protocols: Authentication Header (AH) and Encapsulating Security Payload (ESP). AH is the authenticating protocol, and ESP is an authenticating and encrypting protocol that uses cryptographic mechanisms to provide source authentication, confidentiality, and message integrity.
  • 11. IPSEC (Internet Protocol Security) IPSec can work in one of two modes: transport mode, in which the payload of the message is protected, and tunnel mode, in which the payload and the routing and header information are protected. In transport mode encrypts the actual message information so it cannot be sniffed and uncovered by an unauthorized entity. Tunnel mode provides a higher level of protection by also protecting the header and trailer data an attacker may find useful.
  • 12. Raymond Panko 12 IPsec Encapsulating Security Payload (ESP) Header and Trailer in Transport and Tunnel Modes
  • 13. Raymond Panko 13 IPsec Operation: Transport Mode 1. End-to-End Security (Good) 2. Security in Site Network (Good) 3. Setup Cost On Each Host (Costly)
  • 14. Copyright Pearson Prentice- Hall 2010 14 IPsec Operation: Tunnel Mode 2. No Security in Site Network (Bad) 3. No Setup Cost On Each Host (Good) Raymond Panko
  • 15. Copyright Pearson Prentice- Hall 2010 15 Comparing IPsec Transport and Tunnel Modes Characteristic Transport Mode Tunnel Mode Uses an IPsec VPN Gateway? No Yes Cryptographic Protection All the way from the source host to the destination host, including the Internet and the two site networks. Only over the Internet between the IPsec gateways. Not within the two site networks. Setup Costs High. Setup requires the creation of a digital certificate for each client and significant configuration work. Low. Only the IPsec gateways must implement IPsec, so only they need digital certificates and need to be configured. Raymond Panko
  • 16. The Figure shows the high-level view of the steps of setting up an IPSec connection. SA- A Security Association (SA) is the establishment of shared security attributes between two network entities to support secure communication. An SA may include attributes such as: cryptographic algorithm and mode; traffic encryption key; and parameters for the network data to be passed over the connection.
  • 17. Each device will have at least one security association (SA) for each secure connection it uses. The SA, which is critical to the IPSec architecture, is a record of the configurations the device needs to support an IPSec connection. When two devices complete their handshaking process, which means they have agreed upon a long list of parameters they will use to communicate, these data must be recorded and stored somewhere, which is in the SA. The SA can contain the authentication and encryption keys, the agreed- upon algorithms, the key lifetime, and the source IP address. IPSEC (Internet Protocol Security)
  • 19. When a device receives a packet via the IPSec protocol, it is the SA that tells the device what to do with the packet. So if device B receives a packet from device C via IPSec, device B will look to the corresponding SA to tell it how to decrypt the packet, how to properly authenticate the source of the packet, which key to use, and how to reply to the message if necessary. SAs are directional, so a device will have one SA for outbound traffic and a different SA for inbound traffic for each individual communication channel. If a device is connecting to three devices, it will have at least six SAs, one for each inbound and outbound connection per remote device. IPSEC (Internet Protocol Security)
  • 20. So how can a device keep all of these SAs organized and ensure that the right SA is invoked for the right connection? With the mighty security parameter index (SPI), that’s how. Each device has an SPI that keeps track of the different SAs and tells the device which one is appropriate to invoke for the different packets it receives. The SPI value is in the header of an IPSec packet, and the device reads this value to tell it which SA to consult, as depicted in the Figure. IPSEC (Internet Protocol Security)
  • 21.
  • 22. IPSec can authenticate the sending devices of the packet by using MAC. The ESP protocol can provide authentication, integrity, and confidentiality if the devices are configured for this type of functionality. if a company just needs to make sure it knows the source of the sender and must be assured of the integrity of the packets, it would choose to use AH. IPSEC (Internet Protocol Security)
  • 23. If the company would like to use these services and also have confidentiality, it would use the ESP protocol because it provides encryption functionality. In most cases, the reason ESP is employed is because the company must set up a secure VPN connection. IPSEC (Internet Protocol Security)