SlideShare a Scribd company logo
InternetLayer
Security
Protocol
By Prof. Kirti Ahirrao
Index:
•
•
•
•
•
•
•
•
Prof. Kirti Ahirrao 2
Internet Layer Security Protocol :
• It derives its name from its function facilitating internetworking, which is the concept of
connecting multiple networks with each other through gateways.
• Internet Layer is used to provide internetworking.
• It provides group of internetworking methods, protocols and specifications in IP suite
• It is used for transport network packets.
• Internet-layer protocols use IP-based packets.
Prof. Kirti Ahirrao 3
Function of Internet Layer:
1.
2.
3.
Prof. Kirti Ahirrao 4
Types of
Protocol in
Internet Layer:
•
•
•
•
•
•
Prof. Kirti Ahirrao 5
IP sec : Internet
Protocol
Security
•
•
•
•
Prof. Kirti Ahirrao 6
IP sec : Internet
Protocol
Security
•
•
•
•
Prof. Kirti Ahirrao 7
Architecture of
IP sec:
•
1.
Prof. Kirti Ahirrao 8
Architecture of
IP sec:
2.
Prof. Kirti Ahirrao 9
Architecture of
IP sec:
3.
Prof. Kirti Ahirrao 10
Modes of Operations (IP sec Operations):
• It is divided into two modes :
1. Transport Mode
2. Tunnel Mode
Prof. Kirti Ahirrao 11
1. Transport Mode
• In transport mode, only the payload of the IP packet is usually encrypted or authenticated.
• The routing is intact, since the IP header is neither modified nor encrypted; however, when
the authentication header is used, the IP addresses cannot be modified by network address
translation, as this always invalidates the hash value.
• The transport and application layers are always secured by a hash, so they cannot be
modified in any way, for example by translating the port numbers.
• A means to encapsulate IPsec messages for NAT traversal has been defined
by RFC documents describing the NAT-T mechanism.
Prof. Kirti Ahirrao 12
2. Tunnel Mode
• In tunnel mode, the entire IP packet is encrypted and authenticated. It is then
encapsulated into a new IP packet with a new IP header. Tunnel mode is used to
create virtual private networks for network-to-network communications (e.g. between
routers to link sites), host-to-network communications (e.g. remote user access) and host-
to-host communications (e.g. private chat).
• Tunnel mode supports NAT traversal.
Prof. Kirti Ahirrao 13
Internet Key
Exchange (IKE)
Protocol :
•
•
•
•
Prof. Kirti Ahirrao 14
Implementations
of IKE Protocol:
•
•
•
•
Prof. Kirti Ahirrao 15
Implementations
of IKE Protocol:
•
•
•
Prof. Kirti Ahirrao 16
Reference :
•
Prof. Kirti Ahirrao 17
Thankyou
Prof. Kirti Ahirrao 18

More Related Content

PPTX
Internet protocol
PPTX
internet protocol
PPTX
internet protocol
PPT
Internet Protocol
PPTX
Internet protocol
PPTX
Internet Protocols
PPT
Internet protocols
PPTX
internet protocols
Internet protocol
internet protocol
internet protocol
Internet Protocol
Internet protocol
Internet Protocols
Internet protocols
internet protocols

What's hot (20)

PPTX
Internet Protocols
PPTX
Internet protocols
PPTX
SET UP INTERNET CONNECTION USING MODEM
DOC
Internet protocol concepts and overview
PPTX
Internet protocols Report Slides
PPTX
Protocols and the TCP/IP Protocol Suite
PPTX
What is Network Address Translation (NAT)
PPTX
Role of OSI Layer when we open a webpage
PPT
TCP IP
PPT
Internet protocol
PPTX
Unit III
PPT
Overview of TCP IP
PPTX
Internet protocols
PPTX
Protocol architecture TCP IP
PPTX
Topic 2.3 network addressing for tcpip
PPTX
Network protocols
PPT
Tcp
PPT
Internetbasics
PPTX
Topic 2.1 network communication using osi model part1
PPTX
TCP/IP Protocols
Internet Protocols
Internet protocols
SET UP INTERNET CONNECTION USING MODEM
Internet protocol concepts and overview
Internet protocols Report Slides
Protocols and the TCP/IP Protocol Suite
What is Network Address Translation (NAT)
Role of OSI Layer when we open a webpage
TCP IP
Internet protocol
Unit III
Overview of TCP IP
Internet protocols
Protocol architecture TCP IP
Topic 2.3 network addressing for tcpip
Network protocols
Tcp
Internetbasics
Topic 2.1 network communication using osi model part1
TCP/IP Protocols
Ad

Similar to Internet layer security protocol & IPsec (20)

PDF
IP security and VPN presentation
PDF
IP Security
PPTX
Unit 4 Introduction to internet of Things.pptx
PPTX
A presentation on networking and ccna
PDF
BAIT1103 Chapter 6
PPTX
Multiplexing and demultiplexing, ipv4 types
PPTX
EOC MODULE 3 IP security - SR.pptx engineering college
PPTX
Cryptography and Network security # Lecture 8
PPTX
CCNA Introducing
PPTX
Web technologies: recap on TCP-IP
PPTX
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
PPTX
G3 phase1 final ppt.pptx
PDF
Slide Deck Class Session 8 – FRSecure CISSP Mentor Program
PDF
Chap 1 Network Theory & Java Overview
PDF
IOT NOTES BASED ON THE ENGINEERING ACADEMICS
PPTX
Module 1.pptx
PPTX
Module 8 - Ccna - Pre.pptx
PDF
IP Security One problem with Internet protocol (IP) is that it has.pdf
PPT
MULTIMEDIA SERVICES OVER IP NETWORKS
PDF
Unit 4 Internet of Things communication models.pdf
IP security and VPN presentation
IP Security
Unit 4 Introduction to internet of Things.pptx
A presentation on networking and ccna
BAIT1103 Chapter 6
Multiplexing and demultiplexing, ipv4 types
EOC MODULE 3 IP security - SR.pptx engineering college
Cryptography and Network security # Lecture 8
CCNA Introducing
Web technologies: recap on TCP-IP
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 6
G3 phase1 final ppt.pptx
Slide Deck Class Session 8 – FRSecure CISSP Mentor Program
Chap 1 Network Theory & Java Overview
IOT NOTES BASED ON THE ENGINEERING ACADEMICS
Module 1.pptx
Module 8 - Ccna - Pre.pptx
IP Security One problem with Internet protocol (IP) is that it has.pdf
MULTIMEDIA SERVICES OVER IP NETWORKS
Unit 4 Internet of Things communication models.pdf
Ad

More from Kirti Ahirrao (6)

PPTX
BusTopolgy.pptx
PDF
Attack on Sony
PDF
Firewall traversals
PDF
Application layer security protocol
PDF
Network access layer security protocol
PDF
Chapter 1 introduction(web security)
BusTopolgy.pptx
Attack on Sony
Firewall traversals
Application layer security protocol
Network access layer security protocol
Chapter 1 introduction(web security)

Recently uploaded (20)

PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
TR - Agricultural Crops Production NC III.pdf
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
Lesson notes of climatology university.
PPTX
Pharma ospi slides which help in ospi learning
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
Sports Quiz easy sports quiz sports quiz
PDF
Pre independence Education in Inndia.pdf
PDF
01-Introduction-to-Information-Management.pdf
PDF
Computing-Curriculum for Schools in Ghana
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES
Abdominal Access Techniques with Prof. Dr. R K Mishra
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
human mycosis Human fungal infections are called human mycosis..pptx
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
TR - Agricultural Crops Production NC III.pdf
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Pharmacology of Heart Failure /Pharmacotherapy of CHF
102 student loan defaulters named and shamed – Is someone you know on the list?
VCE English Exam - Section C Student Revision Booklet
Lesson notes of climatology university.
Pharma ospi slides which help in ospi learning
Final Presentation General Medicine 03-08-2024.pptx
Sports Quiz easy sports quiz sports quiz
Pre independence Education in Inndia.pdf
01-Introduction-to-Information-Management.pdf
Computing-Curriculum for Schools in Ghana
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
Black Hat USA 2025 - Micro ICS Summit - ICS/OT Threat Landscape
PPH.pptx obstetrics and gynecology in nursing
BOWEL ELIMINATION FACTORS AFFECTING AND TYPES

Internet layer security protocol & IPsec