270 likes | 371 Views
IP Security. ::: Semester : 8 ::: Year : 2009. Naeem Riaz. Maria Shakeel. P R E S E N T E D B Y. Aqsa. Nizam. INITIATIVE.
E N D
::: Semester : 8 ::: Year : 2009 Naeem Riaz Maria Shakeel P R E S E N T E D B Y Aqsa Nizam
INITIATIVE COMPETITIVE ANALYSIS BEYOND FORWORD FUCTIONAL FEATURES
FEATURES INITIATIVE BEYOND FORWORD COMPETITIVE ANALYSIS Overview at a glance
IPSecurity (IPSec) IPSecurity (IPSec) is a collection of protocols designed by the Internet Engineering Task Force (IETF) to provide security for a packet at the network level.
Benefits of IPSec • Strong security that can be applied to all traffic crossing the perimeter. • Transparent to applications. • No need to change software on a user or server system, -When IPSec is implemented in a router or firewall. • IPSec can be transparent to end users. • There is no need to train users on security mechanisms • IPSec can provide security for individual used if needed.
Cryptographic algorithms • Cryptographic algorithms defined for use with IPsec include: • HMAC-SHA1 for integrity protection • TripleDES-CBC for confidentiality • AES-CBC for confidentiality • .
RFC : IP Sec Documents • RFC 2401: An overview of security architecture • RFC 2402: Description of a packet encryption extension to IPv4 and IPv6 • RFC 2406: Description of a packet emcryption extension to IPv4 and IPv6 • RFC 2408: Specification of key managament capabilities
FUNCTIONAL FEATURES INITIATIVE BEYOND FORWORD COMPETITIVE ANALYSIS Protocols Modes
Modes of IPSec • IPSec operates in one of two different modes. • Transport mode. • Tunnel mode
TRANSPORT MODE VS TUNNEL MODE • IPSec in the transport mode does not protect the IP header; it only protects the information coming from the transport layer. • IPSec in tunnel mode protects the original IP header.
Authentication Header (AH) Protocol & Encapsulating Security Payload (ESP) Protocol • The Authentication Header (AH) Protocol provides source authentication and data integrity but not privacy. • Encapsulating Security Payload (ESP) provides confidentiality services (Must) and authentication services (optionally). • ESP provides sources authentication, data integrity and privacy
INITIATIVE COMPETITVE ANALYSIS BEYOND FORWORD FUNCTIONAL FEATURES IPSec services Key management
Key Management • IPSec architecture support for two type of key management: • Manual: Particular for small, relatively static environments. • Automated: The use of this key in a large distributed system with an evolving configuration
Contd… • Oakley: Key Detemination Protocol: • Three authentication methods can be used with Oakley: • -Digital signatures • -Public-key encryption • -Symmetric-key encryption • ISAKMP: Internet Security Association and Key Management Protocol: • -Defines procedures and packet formats to establish, negotiate, modify and delete security associations.
IPSec Services • IPSec provided Services for: • networking devices, -such as a router or firewall • Operates on the workstation or server. -Workstation to Workstation • Protection against data changes -Accidental or Intentional • Datagram’s Content can be hidden.
BEYOND FOREWORD INITIATIVE COMPETITIVE ANALYSIS FUNCTIONAL FEATURES Real life examples Software implementations THANK YOU
IPSec: Real Life Examples • IPSec provides the capability to secure communications across a LAN, across private and public WANs, and across the Internet. Examples of its use include: • Secure branch office connectivity over the Internet • Secure remote access over the Internet • Establishment of extranet and intranet connectivity with partners • Enhancement of electronic commerce security • Encrypt or authenticate all traffic at the IP level
Contd… • Using IPSec all distributed applications can be secured, • -Remote logon, • -client/server, • -e-mail, • -file transfer, • -Web access
SOFTWARE IMPLEMENTATIONS • NRL IPsec, one of the original sources of IPsec code. • OpenBSD, with its own code derived from a BSD/OS implementation written by John Ioannidis and Angelos D. Keromytis in 1996. • The KAME stack, that is included in Mac OS X, NetBS and FreeBSD. • "IPsec" in Cisco IOS Software • "IPsec" in Microsoft Windows, including Windows XP, Windows 2000, Windows 2003, Windows Vista, Windows Server 2008, and Windows 7. • SafeNet QuickSec toolkits • IPsec in Solaris
Asking queries is your right! Computers are useless, they can only give you answer.