Chapter 31 Security Protocols in the Internet
31.1  IP Level Security Security Association Two Modes Two Security Protocols Encapsulating Security Payload (ESP) Authent...
Figure 31.1   Transport mode
Figure 31.2   Tunnel mode
Figure 31.3   AH
The AH protocol provides source authentication and data integrity,  but not privacy. Note :
Figure 31.4   ESP
ESP provides source authentication, data integrity, and privacy.  Note :
31.2  Transport Layer Security Position of TLS Two Protocols
Figure 31.5   Position of TLS
Figure 31.6   Handshake protocol
31.3  Application Layer Security Pretty Good Privacy
Figure 31.7   PGP at the sender site
Figure 31.8   PGP at the receiver site
31.4  Firewalls Packet-Filter Firewalls Proxy Firewalls
Figure 31.9   Firewall
Figure 31.10   Packet-filter firewall
A packet-filter firewall filters at the network or transport layer.  Note :
Figure 31.11   Proxy firewall
A proxy firewall filters at the application layer. Note :
31. 5  Virtual Private Networks Private Networks Achieving Privacy VPN Technology
Table 31.1  Addresses for private networks 192.168.0.0  to  192.168.255.255 172.16.0.0  to  172.31.255.255 10.0.0.0  to  1...
Figure 31.12   Private network
Figure 31.13   Hybrid network
Figure 31.14   Virtual private network
Figure 31.15   Addressing in a VPN
Upcoming SlideShare
Loading in …5
×

Ch 31

856 views

Published on

tmh slides

Published in: Technology, News & Politics
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
856
On SlideShare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
25
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Ch 31

  1. 1. Chapter 31 Security Protocols in the Internet
  2. 2. 31.1 IP Level Security Security Association Two Modes Two Security Protocols Encapsulating Security Payload (ESP) Authentication Header (AH)
  3. 3. Figure 31.1 Transport mode
  4. 4. Figure 31.2 Tunnel mode
  5. 5. Figure 31.3 AH
  6. 6. The AH protocol provides source authentication and data integrity, but not privacy. Note :
  7. 7. Figure 31.4 ESP
  8. 8. ESP provides source authentication, data integrity, and privacy. Note :
  9. 9. 31.2 Transport Layer Security Position of TLS Two Protocols
  10. 10. Figure 31.5 Position of TLS
  11. 11. Figure 31.6 Handshake protocol
  12. 12. 31.3 Application Layer Security Pretty Good Privacy
  13. 13. Figure 31.7 PGP at the sender site
  14. 14. Figure 31.8 PGP at the receiver site
  15. 15. 31.4 Firewalls Packet-Filter Firewalls Proxy Firewalls
  16. 16. Figure 31.9 Firewall
  17. 17. Figure 31.10 Packet-filter firewall
  18. 18. A packet-filter firewall filters at the network or transport layer. Note :
  19. 19. Figure 31.11 Proxy firewall
  20. 20. A proxy firewall filters at the application layer. Note :
  21. 21. 31. 5 Virtual Private Networks Private Networks Achieving Privacy VPN Technology
  22. 22. Table 31.1 Addresses for private networks 192.168.0.0 to 192.168.255.255 172.16.0.0 to 172.31.255.255 10.0.0.0 to 10.255.255.255 Range 2 16 192.168/16 2 20 172.16/12 2 24 10/8 Total Prefix
  23. 23. Figure 31.12 Private network
  24. 24. Figure 31.13 Hybrid network
  25. 25. Figure 31.14 Virtual private network
  26. 26. Figure 31.15 Addressing in a VPN

×