DOC PREVIEW
NU MSIT 458 - IP Security

This preview shows page 1-2-3-22-23-24-45-46-47 out of 47 pages.

Save
View full document
View full document
Premium Document
Do you want full access? Go Premium and unlock all 47 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 47 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 47 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 47 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 47 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 47 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 47 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 47 pages.
Access to all documents
Download any document
Ad free experience
View full document
Premium Document
Do you want full access? Go Premium and unlock all 47 pages.
Access to all documents
Download any document
Ad free experience
Premium Document
Do you want full access? Go Premium and unlock all 47 pages.
Access to all documents
Download any document
Ad free experience

Unformatted text preview:

Slide 1IP SecurityIPSecIPSec UsesVPNBenefits of IPSecIP Security ArchitectureSlide 8Transport ModeTunnel ModeIPSec ProsIPSec ConsArchitecture & ConceptsAuthentication HeaderIPSec Authentication HeaderIntegrity Check Value - ICVAH: Tunnel and Transport ModeEncapsulating Security Payload (ESP)ESP: Tunnel and Transport ModeOutbound Packet ProcessingESP Transport ExampleInbound Packet Processing...Slide 23NATsNAT typesNAT ExampleWill IPSec Work with NAT ?Backup SlidesSlide 29Security Association - SASecurity Parameters Index - SPISA Database - SADSecurity Policy Database - SPDSlide 34SPD Entry ActionsSPD Protect ActionOutbound ProcessingInbound ProcessingCombining Security AssociationsSlide 40SA BundleOutbound Packet Processing...Inbound Packet ProcessingAnti-replay FeatureAnti-replay Sliding WindowESP Processing - Header Location...Key ManagementIP SecurityIP SecurityHave a range of application specific Have a range of application specific security mechanismssecurity mechanismseg. S/MIME, PGP, Kerberos, SSL/HTTPSeg. S/MIME, PGP, Kerberos, SSL/HTTPSHowever there are security concerns that However there are security concerns that cut across protocol layerscut across protocol layersWould like security implemented by the Would like security implemented by the network for all applicationsnetwork for all applicationsIPSecGeneral IP Security mechanismsGeneral IP Security mechanismsProvidesProvidesauthenticationauthenticationconfidentialityconfidentialitykey managementkey managementApplicable to use over LANs, across public Applicable to use over LANs, across public & private WANs, & for the Internet& private WANs, & for the InternetIPSec UsesTransparencyTransparencyVPNApplication-level VPNE.g., tunnel through sshAnalogous to app-level gatewaysIPSec-based VPNAnalogous to packet-filtering firewallsBenefits of IPSecIn a firewall/router, provides strong security to In a firewall/router, provides strong security to all traffic crossing the perimeterall traffic crossing the perimeterIs below transport layer, hence transparent to Is below transport layer, hence transparent to applicationsapplicationsCan be transparent to end usersCan be transparent to end usersCan provide security for individual even mobile Can provide security for individual even mobile usersusersSecures routing architectureSecures routing architectureIP Security ArchitectureSpecification is quite complexSpecification is quite complexDefined in numerous RFC’sDefined in numerous RFC’sincl. RFC 2401/2402/2406/2408incl. RFC 2401/2402/2406/2408many others, grouped by categorymany others, grouped by categoryMandatory in IPv6, optional in IPv4Mandatory in IPv6, optional in IPv4Have two security header extensions:Have two security header extensions:Authentication Header (AH)Authentication Header (AH)Encapsulating Security Payload (ESP)Encapsulating Security Payload (ESP)A BEncrypted TunnelGateway 1 Gateway 2New IP HeaderAH or ESP HeaderTCP DataOrig IP HeaderEncryptedUnencryptedUnencryptedTransport Mode vs. Tunnel ModeTransport mode: host -> hostTransport mode: host -> hostTunnel mode: host->gateway or gateway->gatewayTunnel mode: host->gateway or gateway->gatewayTransport ModeESP protects higher layer payload onlyESP protects higher layer payload onlyAH can protect IP headers as well as higher AH can protect IP headers as well as higher layer payloadlayer payloadIPheaderIPoptionsIPSecheaderHigherlayer protocolESPAHReal IPdestinationTunnel ModeESP applies only to the tunneled packetESP applies only to the tunneled packetAH can be applied to portions of the outer AH can be applied to portions of the outer headerheaderOuter IPheaderInner IPheaderIPSecheaderHigherlayer protocolESPAHReal IP destinationDestinationIPSecentityIPSec ProsHides the identity of your networkProvides secure channel: confidentiality, authenticity, and integrityConnects sites (e.g., branch offices) with a cost-effective secure network compared with leased linesAllows user to work from home and mobile hostsIPSec ConsA single failure in the path disconnect the entire network. Also cause performance bottlenecks.Incompatible with NAT/PAT depending on the architectureTunneled traffic is undetected by IDS VPN gateways might be compromised which leads to uncovering protected dataArchitecture & ConceptsTunnel vs. Transport modeTunnel vs. Transport modeSecurity association (SA)Security association (SA)Security parameter index (SPI)Security parameter index (SPI)Security policy database (SPD)Security policy database (SPD)SA database (SAD)SA database (SAD)Authentication header (AH)Authentication header (AH)Encapsulating security payload (ESP)Encapsulating security payload (ESP)Practical Issues w/ NATPractical Issues w/ NATAuthentication HeaderData integrityData integrityEntire packet has not been tampered withEntire packet has not been tampered withAuthenticationAuthenticationCan “trust” IP address sourceCan “trust” IP address sourceAnti-replay featureAnti-replay featureIntegrity check valueIntegrity check value……SADSPISequence NumberICVNext Header (TCP/UDP)Payload LengthReservedIPSec Authentication HeaderLength of the authentication headerLength of the authentication headerIntegrity Check Value - ICVKeyed Message authentication code (MAC) Keyed Message authentication code (MAC) calculated overcalculated overIP header field that do not change or are predictableIP header field that do not change or are predictableSource IP address, destination IP, header length, etc.Source IP address, destination IP, header length, etc.Prevent spoofingPrevent spoofingMutable fields excluded: e.g., time-to-live (TTL), IP Mutable fields excluded: e.g., time-to-live (TTL), IP header checksum, etc.header checksum, etc.IPSec protocol header except the ICV value fieldIPSec protocol header except the ICV value fieldUpper-level dataUpper-level dataCode may be truncated to first 96 bitsCode may be truncated to first 96 bitsAH: Tunnel and Transport ModeOriginalOriginalTransport ModeTransport ModeCover most of the Cover most of the original packetoriginal packetTunnel ModeTunnel ModeCover entire Cover entire original packetoriginal packetEncapsulating Security Payload (ESP)Provide Provide message content confidentialitymessage content confidentialityProvideProvide limited traffic


View Full Document

NU MSIT 458 - IP Security

Documents in this Course
Snort

Snort

25 pages

Hacked

Hacked

23 pages

Hacked

Hacked

6 pages

Firewalls

Firewalls

52 pages

Load more
Download IP Security
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view IP Security and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view IP Security 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?