IP Protocol Security
IPsec is an IETF standard that defines how a remote or site-to-
siteVPN can be configured at the Network Layer
IPsec is an IETF standard that defines how a remote or site-to-
siteVPN can be configured at the Network Layer
Provides Data Encryption to secureTCP/IP based Applications
Used with IP only!
Used with IP only!
Encrypts any traffic using the IP Protocol!
Used with IP only!
Both Encryption and Authentication Mechanisms!
Encrypts any traffic using the IP Protocol!
Used with IP only!
Both Encryption and Authentication Mechanisms!
Encrypts any traffic using the IP Protocol!
Requires Certificates of Pre Shared Keys!
Used with IP only!
Both Encryption and Authentication Mechanisms!
Encrypts any traffic using the IP Protocol!
Requires Certificates of Pre Shared Keys!
Functions at the Network Layer!
Used with IP only!
Both Encryption and Authentication Mechanisms!
Encrypts any traffic using the IP Protocol!
Requires Certificates of Pre Shared Keys!
Functions at the Network Layer!
Generally can’t be used with a NAT proxy Deployment..
Used with IP only!
Both Encryption and Authentication Mechanisms!
Encrypts any traffic using the IP Protocol!
Requires Certificates of Pre Shared Keys!
Functions at the Network Layer!
Generally can’t be used with a NAT proxy Deployment..
Can be used with L2TP or alone to protect data!
Used with IP only!
Both Encryption and Authentication Mechanisms!
Encrypts any traffic using the IP Protocol!
Requires Certificates of Pre Shared Keys!
Functions at the Network Layer!
Generally can’t be used with a NAT proxy Deployment..
Uses UDP Port 500..
Can be used with L2TP or alone to protect data!
Used with IP only!
Both Encryption and Authentication Mechanisms!
Encrypts any traffic using the IP Protocol!
Requires Certificates of Pre Shared Keys!
Functions at the Network Layer!
Generally can’t be used with a NAT proxy Deployment..
Uses UDP Port 500..
Can be used with L2TP or alone to protect data!
Most secure configuration => Provides Confidentiality, Integrity, Authentication and Anti-Replay Attack.
VPNs and IPsec provide Essential Services for remote connectivity!
Used with IP only!
Both Encryption and Authentication Mechanisms!
Encrypts any traffic using the IP Protocol!
Requires Certificates of Pre Shared Keys!
Functions at the Network Layer!
Generally can’t be used with a NAT proxy Deployment..
Uses UDP Port 500..
Can be used with L2TP or alone to protect data!
Most secure configuration => Provides Confidentiality, Integrity, Authentication and Anti-Replay Attack.
IP Protocol Security
• Services offered on a static topology are essential.
• Services offered on a static topology are essential.
• Services offered on a dynamic topology are emerging.
• Services offered on a static topology are essential.
• Services offered on a dynamic topology are emerging.
• Today there’s a Gap to fill in mobile services.
• Services offered on a static topology are essential.
• Services offered on a dynamic topology are emerging.
• Today there’s a Gap to fill in mobile services.
• Private  Public  Private data flow =VPN.
• Services offered on a static topology are essential.
• Services offered on a dynamic topology are emerging.
• Today there’s a Gap to fill in mobile services.
• Private  Public  Private data flow =VPN.
• Trending toward mobile nodes NOW!
• Services offered on a static topology are essential.
• Services offered on a dynamic topology are emerging.
• Today there’s a Gap to fill in mobile services.
• Private  Public  Private data flow =VPN.
• Trending toward mobile nodes NOW!
• Mobile devices will have Layer 3 switching embedded.
• Services offered on a static topology are essential.
• Services offered on a dynamic topology are emerging.
• Today there’s a Gap to fill in mobile services.
• Private  Public  Private data flow =VPN.
• Trending toward mobile nodes NOW!
• Mobile devices will have Layer 3 switching embedded.
• Routers will become obselete.
• VPNs have become an essential service.
• VPNs have become an essential service.
• Discretionary access rights for individual users allowed.
• VPNs have become an essential service.
• Discretionary access rights for individual users allowed.
• Role Based access rights for user groups allowed.
• VPNs have become an essential service.
• Discretionary access rights for individual users allowed.
• Role Based access rights for user groups allowed.
• Users essential take their office with them.
• VPNs have become an essential service.
• Discretionary access rights for individual users allowed.
• Role Based access rights for user groups allowed.
• Users essential take their office with them.
• VPN method implemented based on access, policy and
procedures of the organization.
• VPNs have become an essential service.
• Discretionary access rights for individual users allowed.
• Role Based access rights for user groups allowed.
• Users essential take their office with them.
• VPN method implemented based on access, policy and
procedures of the organization.
• Two primary protocols forVPN deployment.
• VPNs have become an essential service.
• Discretionary access rights for individual users allowed.
• Role Based access rights for user groups allowed.
• Users essential take their office with them.
• VPN method implemented based on access, policy and
procedures of the organization.
• Two primary protocols forVPN deployment.
1. IPSec for Site-to-Site.
• VPNs have become an essential service.
• Discretionary access rights for individual users allowed.
• Role Based access rights for user groups allowed.
• Users essential take their office with them.
• VPN method implemented based on access, policy and
procedures of the organization.
• Two primary protocols forVPN deployment.
1. IPSec for Site-to-Site.
2. SSL – Remote Access
1. If ease of Configuration and support is an issue.
 Use SSL
1. If ease of Configuration and support is an issue.
 Use SSL
2. If security is the issue.
Use IPSec.
1. If ease of Configuration and support is an issue.
 Use SSL
2. If security is the issue.
Use IPSec.
3. If using IPv6.
 Use IPSec.
1. If ease of Configuration and support is an issue.
 Use SSL
2. If security is the issue.
Use IPsec.
3. If using IPv6.
 Use IPsec.
IPsec exceeds SSL in many significant ways:
Number of applications that are supported
Strength of encryption
Strength of authentication
Overall security
When security is an issue, IPsec is the superior choice. If
support and ease of deployment are the primary issues,
consider SSL.
IP Protocol Security
Confidentiality
• IPsec provides security features, such as strong
encryption algorithms.
Symmetric Encryption
• Symmetric algorithms such as AES required shared keys.
• Each device requires the same key to decode information.
• Knowledge of which devices interact must be known so
the same key can be configured on each device.
Asymmetric Encryption
• Asymmetric uses different keys.
• One encrypts, the other decrypts.
• Impossible to decode using the same keys.
Data Integrity
• Diffe-Hellman is not an encryption mechanism
• The algorithms allow two parties to establish a shared key.
• This key is used by encryp0tion and hash algorithms.
Data Integrity and Authentication
• Hashes provide Integrity and Authentication.
• The hash (message digest) creates a unique
value for set of data.
• IFF hashes are equal, the data is not altered.
Data Integrity
• PSK – Configured one each peer manually and used
to authenticate each end.
• PSK is combined with other information to form the
authentication key.
Authentication
•
Authentication Header is used when confidentiality is
not required or permitted.
• Authentication and Integrity are established between
each system.
• All text is transported in clear text.
Authentication
•
Authentication Header is used when confidentiality is
not required or permitted.
• Authentication and Integrity are established between
each system.
• All text is transported in clear text.
• Encapsulating Security Payload – Provides
Confidentiality and Authentication by encryption.
• IP packet encryption conceals the data and identities
of the end devices.
• In IPsec, at least one of these must be used.
IPsec framework protocol - When configuring an IPsec gateway to provide security services, an IPsec protocol must be
selected.The choices are some combination of ESP and AH. Realistically, the ESP or ESP+AH options are almost always
selected because AH itself does not provide encryption, as shown in Figure 3.
Confidentiality (If IPsec is implemented with ESP) -The encryption algorithm chosen should best meet the desired level
of security: DES, 3DES, or AES. AES is strongly recommended, with AES-GCM providing the greatest security.
Integrity - Guarantees that the content has not been altered in transit. Implemented through the use of hash algorithms.
Choices include MD5 and SHA.
Authentication - Represents how devices on either end of theVPN tunnel are authenticated.The two methods are PSK or
RSA.
DH algorithm group - Represents how a shared secret key is established between peers.There are several options, but
DH24 provides the greatest security.
IP Protocol Framework
IPsec, an IETF standard, is a secure tunnel operating at Layer 3 of the OSI model that can protect and authenticate IP
packets between IPsec peers. It can provide confidentiality by using encryption, data integrity, authentication, and anti-
replay protection. Data integrity is provided by using a hash algorithm, such as MD5 or SHA.Authentication is provided by
the PSK or RSA peer authentication method.
The level of confidentiality provided by encryption depends on the algorithm used and the key length. Encryption can be
symmetrical or asymmetrical. DH is a method used to securely exchange the keys to encrypt data.
Summary
IP Protocol Security
IP Protocol Security

More Related Content

PPTX
Internet protocol security
PPTX
Internet security protocol
PDF
8 Authentication Security Protocols
PPTX
IP Security
PPTX
Cyber security
PPT
Lecture 5 ip security
PDF
Wireless Cracking using Kali
PDF
BAIT1103 Chapter 6
Internet protocol security
Internet security protocol
8 Authentication Security Protocols
IP Security
Cyber security
Lecture 5 ip security
Wireless Cracking using Kali
BAIT1103 Chapter 6

What's hot (19)

PPT
Websecurity
PPTX
Wpa vs Wpa2
PPS
Workshop on Wireless Security
PPTX
Ip security
PPT
5169 wireless network_security_amine_k
PPT
PPTX
Wireless Security null seminar
PPTX
Wireless network security
PDF
Web Security
PPTX
ip security
PPT
PPTX
Keymanagement of ipsec
PPTX
Wireless security using wpa2
PDF
IP Security
PPTX
Wireless network security
PPTX
Virtual Private Network
PPTX
Wpa2 psk security measure
PPTX
802.11i
Websecurity
Wpa vs Wpa2
Workshop on Wireless Security
Ip security
5169 wireless network_security_amine_k
Wireless Security null seminar
Wireless network security
Web Security
ip security
Keymanagement of ipsec
Wireless security using wpa2
IP Security
Wireless network security
Virtual Private Network
Wpa2 psk security measure
802.11i
Ad

Viewers also liked (15)

PPTX
Secure Hash Algorithm (SHA-512)
PPTX
Message Authentication using Message Digests and the MD5 Algorithm
PPTX
Hash function
PPTX
Hash Techniques in Cryptography
PPT
Network security and protocols
PPT
Secure hashing algorithm
PPT
Hash Function & Analysis
PPTX
Hash Function
PPT
Public Key Cryptography and RSA algorithm
PDF
RSA ALGORITHM
PPT
NetworkSecurity.ppt
PPTX
Secure Hash Algorithm
PPTX
Network security
PPT
Network security
PPTX
RSA & MD5 algorithm
Secure Hash Algorithm (SHA-512)
Message Authentication using Message Digests and the MD5 Algorithm
Hash function
Hash Techniques in Cryptography
Network security and protocols
Secure hashing algorithm
Hash Function & Analysis
Hash Function
Public Key Cryptography and RSA algorithm
RSA ALGORITHM
NetworkSecurity.ppt
Secure Hash Algorithm
Network security
Network security
RSA & MD5 algorithm
Ad

Similar to IP Protocol Security (20)

PPTX
Module 8 - Ccna - Pre.pptx
PDF
Cn36539543
PPTX
Network Security version Virtual Private Networks
DOCX
college assignment on Applications of ipsec
PPTX
Cryptography and Network security # Lecture 8
PPTX
PACE-IT: Networking Services and Applications (part 1) - N10 006
PPTX
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
PPTX
IPSec VPN & IPSec Protocols
PDF
VPN Theory
PPTX
chAPTER 19 INTERNET PROTOCOL SECURITY PRESENTATION
PDF
IP security and VPN presentation
PPTX
CryptoStandards and protocols for digital secure communications
PPT
PPTX
Vpn(virtual private network)
PDF
A Comparative Research on SSL VPN and IPSec VPN
PPT
Ip sec and ssl
PPT
PDF
Curso: Redes y comunicaciones básicas: 03 VPN
PPT
Virtual Private Network
Module 8 - Ccna - Pre.pptx
Cn36539543
Network Security version Virtual Private Networks
college assignment on Applications of ipsec
Cryptography and Network security # Lecture 8
PACE-IT: Networking Services and Applications (part 1) - N10 006
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
IPSec VPN & IPSec Protocols
VPN Theory
chAPTER 19 INTERNET PROTOCOL SECURITY PRESENTATION
IP security and VPN presentation
CryptoStandards and protocols for digital secure communications
Vpn(virtual private network)
A Comparative Research on SSL VPN and IPSec VPN
Ip sec and ssl
Curso: Redes y comunicaciones básicas: 03 VPN
Virtual Private Network

Recently uploaded (20)

PDF
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
PDF
Course Overview and Agenda cloud security
PPTX
TITLE DEFENSE entitle the impact of social media on education
PDF
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
PDF
Exploring VPS Hosting Trends for SMBs in 2025
PDF
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
PDF
simpleintnettestmetiaerl for the simple testint
PPTX
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
PDF
Alethe Consulting Corporate Profile and Solution Aproach
PDF
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
PPTX
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
PPTX
Layers_of_the_Earth_Grade7.pptx class by
PPTX
The-Importance-of-School-Sanitation.pptx
PDF
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
PPTX
t_and_OpenAI_Combined_two_pressentations
PDF
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
PPTX
newyork.pptxirantrafgshenepalchinachinane
PPT
250152213-Excitation-SystemWERRT (1).ppt
PDF
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
PPTX
Internet Safety for Seniors presentation
Buy Cash App Verified Accounts Instantly – Secure Crypto Deal.pdf
Course Overview and Agenda cloud security
TITLE DEFENSE entitle the impact of social media on education
BIOCHEM CH2 OVERVIEW OF MICROBIOLOGY.pdf
Exploring VPS Hosting Trends for SMBs in 2025
SlidesGDGoCxRAIS about Google Dialogflow and NotebookLM.pdf
simpleintnettestmetiaerl for the simple testint
IPCNA VIRTUAL CLASSES INTERMEDIATE 6 PROJECT.pptx
Alethe Consulting Corporate Profile and Solution Aproach
mera desh ae watn.(a source of motivation and patriotism to the youth of the ...
Top Website Bugs That Hurt User Experience – And How Expert Web Design Fixes
Layers_of_the_Earth_Grade7.pptx class by
The-Importance-of-School-Sanitation.pptx
Top 8 Trusted Sources to Buy Verified Cash App Accounts.pdf
t_and_OpenAI_Combined_two_pressentations
📍 LABUAN4D EXCLUSIVE SERVER STAR GAMING ASIA NO.1 TERPOPULER DI INDONESIA ! 🌟
newyork.pptxirantrafgshenepalchinachinane
250152213-Excitation-SystemWERRT (1).ppt
Lean-Manufacturing-Tools-Techniques-and-How-To-Use-Them.pdf
Internet Safety for Seniors presentation

IP Protocol Security

  • 2. IPsec is an IETF standard that defines how a remote or site-to- siteVPN can be configured at the Network Layer
  • 3. IPsec is an IETF standard that defines how a remote or site-to- siteVPN can be configured at the Network Layer Provides Data Encryption to secureTCP/IP based Applications
  • 4. Used with IP only!
  • 5. Used with IP only! Encrypts any traffic using the IP Protocol!
  • 6. Used with IP only! Both Encryption and Authentication Mechanisms! Encrypts any traffic using the IP Protocol!
  • 7. Used with IP only! Both Encryption and Authentication Mechanisms! Encrypts any traffic using the IP Protocol! Requires Certificates of Pre Shared Keys!
  • 8. Used with IP only! Both Encryption and Authentication Mechanisms! Encrypts any traffic using the IP Protocol! Requires Certificates of Pre Shared Keys! Functions at the Network Layer!
  • 9. Used with IP only! Both Encryption and Authentication Mechanisms! Encrypts any traffic using the IP Protocol! Requires Certificates of Pre Shared Keys! Functions at the Network Layer! Generally can’t be used with a NAT proxy Deployment..
  • 10. Used with IP only! Both Encryption and Authentication Mechanisms! Encrypts any traffic using the IP Protocol! Requires Certificates of Pre Shared Keys! Functions at the Network Layer! Generally can’t be used with a NAT proxy Deployment.. Can be used with L2TP or alone to protect data!
  • 11. Used with IP only! Both Encryption and Authentication Mechanisms! Encrypts any traffic using the IP Protocol! Requires Certificates of Pre Shared Keys! Functions at the Network Layer! Generally can’t be used with a NAT proxy Deployment.. Uses UDP Port 500.. Can be used with L2TP or alone to protect data!
  • 12. Used with IP only! Both Encryption and Authentication Mechanisms! Encrypts any traffic using the IP Protocol! Requires Certificates of Pre Shared Keys! Functions at the Network Layer! Generally can’t be used with a NAT proxy Deployment.. Uses UDP Port 500.. Can be used with L2TP or alone to protect data! Most secure configuration => Provides Confidentiality, Integrity, Authentication and Anti-Replay Attack.
  • 13. VPNs and IPsec provide Essential Services for remote connectivity! Used with IP only! Both Encryption and Authentication Mechanisms! Encrypts any traffic using the IP Protocol! Requires Certificates of Pre Shared Keys! Functions at the Network Layer! Generally can’t be used with a NAT proxy Deployment.. Uses UDP Port 500.. Can be used with L2TP or alone to protect data! Most secure configuration => Provides Confidentiality, Integrity, Authentication and Anti-Replay Attack.
  • 15. • Services offered on a static topology are essential.
  • 16. • Services offered on a static topology are essential. • Services offered on a dynamic topology are emerging.
  • 17. • Services offered on a static topology are essential. • Services offered on a dynamic topology are emerging. • Today there’s a Gap to fill in mobile services.
  • 18. • Services offered on a static topology are essential. • Services offered on a dynamic topology are emerging. • Today there’s a Gap to fill in mobile services. • Private  Public  Private data flow =VPN.
  • 19. • Services offered on a static topology are essential. • Services offered on a dynamic topology are emerging. • Today there’s a Gap to fill in mobile services. • Private  Public  Private data flow =VPN. • Trending toward mobile nodes NOW!
  • 20. • Services offered on a static topology are essential. • Services offered on a dynamic topology are emerging. • Today there’s a Gap to fill in mobile services. • Private  Public  Private data flow =VPN. • Trending toward mobile nodes NOW! • Mobile devices will have Layer 3 switching embedded.
  • 21. • Services offered on a static topology are essential. • Services offered on a dynamic topology are emerging. • Today there’s a Gap to fill in mobile services. • Private  Public  Private data flow =VPN. • Trending toward mobile nodes NOW! • Mobile devices will have Layer 3 switching embedded. • Routers will become obselete.
  • 22. • VPNs have become an essential service.
  • 23. • VPNs have become an essential service. • Discretionary access rights for individual users allowed.
  • 24. • VPNs have become an essential service. • Discretionary access rights for individual users allowed. • Role Based access rights for user groups allowed.
  • 25. • VPNs have become an essential service. • Discretionary access rights for individual users allowed. • Role Based access rights for user groups allowed. • Users essential take their office with them.
  • 26. • VPNs have become an essential service. • Discretionary access rights for individual users allowed. • Role Based access rights for user groups allowed. • Users essential take their office with them. • VPN method implemented based on access, policy and procedures of the organization.
  • 27. • VPNs have become an essential service. • Discretionary access rights for individual users allowed. • Role Based access rights for user groups allowed. • Users essential take their office with them. • VPN method implemented based on access, policy and procedures of the organization. • Two primary protocols forVPN deployment.
  • 28. • VPNs have become an essential service. • Discretionary access rights for individual users allowed. • Role Based access rights for user groups allowed. • Users essential take their office with them. • VPN method implemented based on access, policy and procedures of the organization. • Two primary protocols forVPN deployment. 1. IPSec for Site-to-Site.
  • 29. • VPNs have become an essential service. • Discretionary access rights for individual users allowed. • Role Based access rights for user groups allowed. • Users essential take their office with them. • VPN method implemented based on access, policy and procedures of the organization. • Two primary protocols forVPN deployment. 1. IPSec for Site-to-Site. 2. SSL – Remote Access
  • 30. 1. If ease of Configuration and support is an issue.  Use SSL
  • 31. 1. If ease of Configuration and support is an issue.  Use SSL 2. If security is the issue. Use IPSec.
  • 32. 1. If ease of Configuration and support is an issue.  Use SSL 2. If security is the issue. Use IPSec. 3. If using IPv6.  Use IPSec.
  • 33. 1. If ease of Configuration and support is an issue.  Use SSL 2. If security is the issue. Use IPsec. 3. If using IPv6.  Use IPsec.
  • 34. IPsec exceeds SSL in many significant ways: Number of applications that are supported Strength of encryption Strength of authentication Overall security When security is an issue, IPsec is the superior choice. If support and ease of deployment are the primary issues, consider SSL.
  • 36. Confidentiality • IPsec provides security features, such as strong encryption algorithms.
  • 37. Symmetric Encryption • Symmetric algorithms such as AES required shared keys. • Each device requires the same key to decode information. • Knowledge of which devices interact must be known so the same key can be configured on each device.
  • 38. Asymmetric Encryption • Asymmetric uses different keys. • One encrypts, the other decrypts. • Impossible to decode using the same keys.
  • 39. Data Integrity • Diffe-Hellman is not an encryption mechanism • The algorithms allow two parties to establish a shared key. • This key is used by encryp0tion and hash algorithms.
  • 40. Data Integrity and Authentication • Hashes provide Integrity and Authentication. • The hash (message digest) creates a unique value for set of data. • IFF hashes are equal, the data is not altered.
  • 41. Data Integrity • PSK – Configured one each peer manually and used to authenticate each end. • PSK is combined with other information to form the authentication key.
  • 42. Authentication • Authentication Header is used when confidentiality is not required or permitted. • Authentication and Integrity are established between each system. • All text is transported in clear text.
  • 43. Authentication • Authentication Header is used when confidentiality is not required or permitted. • Authentication and Integrity are established between each system. • All text is transported in clear text. • Encapsulating Security Payload – Provides Confidentiality and Authentication by encryption. • IP packet encryption conceals the data and identities of the end devices. • In IPsec, at least one of these must be used.
  • 44. IPsec framework protocol - When configuring an IPsec gateway to provide security services, an IPsec protocol must be selected.The choices are some combination of ESP and AH. Realistically, the ESP or ESP+AH options are almost always selected because AH itself does not provide encryption, as shown in Figure 3. Confidentiality (If IPsec is implemented with ESP) -The encryption algorithm chosen should best meet the desired level of security: DES, 3DES, or AES. AES is strongly recommended, with AES-GCM providing the greatest security. Integrity - Guarantees that the content has not been altered in transit. Implemented through the use of hash algorithms. Choices include MD5 and SHA. Authentication - Represents how devices on either end of theVPN tunnel are authenticated.The two methods are PSK or RSA. DH algorithm group - Represents how a shared secret key is established between peers.There are several options, but DH24 provides the greatest security. IP Protocol Framework
  • 45. IPsec, an IETF standard, is a secure tunnel operating at Layer 3 of the OSI model that can protect and authenticate IP packets between IPsec peers. It can provide confidentiality by using encryption, data integrity, authentication, and anti- replay protection. Data integrity is provided by using a hash algorithm, such as MD5 or SHA.Authentication is provided by the PSK or RSA peer authentication method. The level of confidentiality provided by encryption depends on the algorithm used and the key length. Encryption can be symmetrical or asymmetrical. DH is a method used to securely exchange the keys to encrypt data. Summary

Editor's Notes