SlideShare a Scribd company logo
Internet Protocol Security
An Overview of IPSec
1
dept. of ECE
Outline:
 What Security Problem? - Kamran ahmed
 Understanding TCP/IP. - Kamran ahmed
 Security at What Level? -
 IP Security.
 IPSec Security Services.
 Modes of operation.
 IPSec Security Protocols.
 Outbound/Inbound IPSec Processing.
 Real World Deployment Examples.
2
dept. of ECE
What Security Problem?
Today's Internet is primarily comprised of :
 Public
 Un-trusted
 Unreliable IP networks
Because of this inherent lack of security,
the Internet is subject to various types of
threats…
3
dept. of ECE
Internet Threats
 Data integrity
The contents of a packet can be accidentally or deliberately modified.
 Identity spoofing
The origin of an IP packet can be forged.
 Anti-reply attacks
Unauthorized data can be retransmitted.
 Loss of privacy
The contents of a packet can be examined in transit.
4
dept. of ECE
Understanding TCP/IP
OSI Reference Model
Application Layer
Transport Layer
Network Layer
Physical Layer
Presentation Layer
Session Layer
Logical Link Layer
TCP, UDP
IP
Network Adapter
Device Driver
Application
HTTP
SMTP
FTP
SNMP
NFS
FTP
DNS
5
dept. of ECE 2024-25
Understanding TCP/IP
Encapsulation of Data for Network Delivery
Original
Message
Application Layer
6
dept. of ECE
Understanding TCP/IP
Encapsulation of Data for Network Delivery
Original
Message
Data 3
Application Layer
Transport Layer
(TCP, UDP)
7
dept. of ECE 2024-25
Understanding TCP/IP
Encapsulation of Data for Network Delivery
Original
Message
Data 3
Header 3
Transport Layer
(TCP, UDP)
Application Layer
8
dept. of ECE 2024-25
Understanding TCP/IP
Encapsulation of Data for Network Delivery
Original
Message
Data 3
Header 3
Data 2
Transport Layer
(TCP, UDP)
Network Layer
(IP)
Application Layer
9
dept. of ECE 2024-25
Understanding TCP/IP
Encapsulation of Data for Network Delivery
Original
Message
Data 3
Header 3
Data 2
Header 2
Transport Layer
(TCP, UDP)
Network Layer
(IP)
Application Layer
10
dept. of ECE 2024-25
Understanding TCP/IP
Encapsulation of Data for Network Delivery
Original
Message
Data 3
Header 3
Data 2
Header 2
Transport Layer
(TCP, UDP)
Network Layer
(IP)
Data 1
Application Layer
Data Link
Layer
11
dept. of ECE 2024-25
Understanding TCP/IP
Encapsulation of Data for Network Delivery
Original
Message
Data 3
Header 3
Data 2
Header 2
Transport Layer
(TCP, UDP)
Network Layer
(IP)
Data 1
Header 1
Application Layer
Data Link
Layer
12
dept. of ECE 2024-25
Understanding TCP/IP
Data 1
Header 1
Packet
Packet Sent by Host A
Data Link
Layer
13
dept. of ECE 2024-25
Understanding TCP/IP
Network Layer
Data Link Layer
Packet Received by intermediary Router
14
dept. of ECE
Understanding TCP/IP
Data 1
Header 1
Packet
Packet Received by Host B
Data Link
Layer
15
dept. of ECE
Understanding TCP/IP
Data 1
Header 1
De-capsulation of Data from Network Delivery
Data Link
Layer
16
dept. of ECE
Understanding TCP/IP
De-capsulation of Data from Network Delivery
Data 1
Data Link
Layer
17
dept. of ECE
Understanding TCP/IP
De-capsulation of Data from Network Delivery
Data 2
Header 2
Network Layer
(IP)
18
dept. of ECE
Understanding TCP/IP
De-capsulation of Data from Network Delivery
Data 2
Network Layer
(IP)
19
dept. of ECE
Understanding TCP/IP
De-capsulation of Data from Network Delivery
Data 3
Header 3
Transport Layer
(TCP, UDP)
20
dept. of ECE
Understanding TCP/IP
De-capsulation of Data from Network Delivery
Data 3
Transport Layer
(TCP, UDP)
21
dept. of ECE
Understanding TCP/IP
De-capsulation of Data from Network Delivery
Original
Message
Application Layer
22
dept. of ECE
Understanding TCP/IP
De-capsulation of Data from Network Delivery
Original
Message
Application Layer
23
dept. of ECE
Security at What Level?
Application Layer
Transport Layer
Network Layer
Data Link Layer
PGP, Kerberos, SSH, etc.
Transport Layer Security (TLS)
IP Security
Hardware encryption
24
dept. of ECE
Security at Application Layer
(PGP, Kerberos, SSH, etc.)
 Implemented in end-hosts
 Advantages
- Extend application without involving operating system.
- Application can understand the data and can provide the appropriate
security.
 Disadvantages
- Security mechanisms have to be designed independently of each
application.
25
dept. of ECE
Security at Transport Layer
Transport Layer Security (TLS)
 Implemented in end-hosts
 Advantages
- Existing applications get security seamlessly
 Disadvantages
- Protocol specific
26
dept. of ECE
Security at Network Layer
IP Security (IPSec)
 Advantages
- Provides seamless security to application and transport layers (ULPs).
- Allows per flow or per connection security and thus allows for very
fine-grained security control.
 Disadvantages
- More difficult to to exercise on a per user basis on a multi-user
machine.
27
dept. of ECE
Security at Data Link Layer
 (Hardware encryption)
 Need a dedicated link between host/routers.
 Advantages
- Speed.
 Disadvantages
- Not scalable.
- Need dedicated links.
28
dept. of ECE
IP Security (IPSec)
 IPSec is a framework of open standards
developed by the Internet Engineering Task
Force (IETF).
Creates secure, authenticated, reliable
communications over IP networks
29
dept. of ECE
IPSec Security Services
 Connectionless integrity
Assurance that received traffic has not been
modified. Integrity includes anti-reply defenses.
 Data origin authentication
Assurance that traffic is sent by legitimate party or parties.
 Confidentiality (encryption)
Assurance that user’s traffic is not examined by non-
authorized parties.
 Access control
Prevention of unauthorized use of a resource.
30
dept. of ECE
IPSec Modes of Operation
 Transport Mode: protect the upper layer protocols
IP
Header
TCP
Header
Data
Original IP
Datagram
IP
Header
TCP
Header
IPSec
Header
Data
Transport Mode
protected packet
 Tunnel Mode: protect the entire IP payload
Tunnel Mode
protected packet
New IP
Header
TCP
Header
IPSec
Header
Data
Original IP
Header
protected
protected
31
dept. of ECE
Tunnel Mode
 Host-to-Network, Network-to-Network
Protected
Data
IPSec
IP Layer
SG
Internet
Transport
Layer
Application
Layer
IP
Layer
Host B
Protected
Data
IPSec
IP Layer
SG
Transport
Layer
Application
Layer
IP
Layer
Host A
SG = Security Gateway
32
dept. of ECE
Transport Mode
Transport Layer
Application Layer
 Host-to-Host
Transport Layer
Application Layer
IP Layer
Data Link Layer
IPSec
Host B
IP Layer
Data Link Layer
IPSec
Host A
33
dept. of ECE
IPSec Security Protocols
 Authentication Header (AH)
 Encapsulating Security Payload (ESP)
34
dept. of ECE
IPSec Security Protocols
 Authentication Header (AH) provides:
- Connectionless integrity
- Data origin authentication
- Protection against replay attacks
 Encapsulating Security Payload (ESP) provides:
- Confidentiality (encryption)
- Connectionless integrity
- Data origin authentication
- Protection against reply attacks
 Both protocols may be used alone or applied in
combination with each other.
35
dept. of ECE
Outbound/Inbound IPSec
Processing
 The inbound and the outbound IPSec
processing are completely independent.
Packet
36
dept. of ECE
SPD
IPSec policies
SAD
SPD = Security Policy Database
SAD = Security Association Database
SA = Security Association
Packet
Outbound IPSec Processing
selector
1. Drop the packet.
2. Bypass IPSec.
3. Apply IPSec.
SAout
37
dept. of ECE
SPD
IPSec policies
Packet
Inbound IPSec Processing
Case 1:
If IPSec headers exists
1. Headers are processed.
2. SPD is consulted to
determine if the packet
can be admitted based on
the Sain.
SPD = Security Policy Database
SAD = Security Association Database
SA = Security Association
38
dept. of ECE
SPD
IPSec policies
Packet
Inbound IPSec Processing
Case 2:
If IPSec headers are absent
1. SPD is consulted to
determine the type of
service to afford this packet.
2. If certain traffic is required
to be IPSec protected and its
not it must be dropped.
SPD = Security Policy Database
SAD = Security Association Database
SA = Security Association
39
dept. of ECE
Real World Deployment
Examples
 VPNs
 Wireless
Internet
SG
Internet
Encrypted / Authenticated
40
dept. of ECE
Conclusion
 The Internet was not created with security in mind.
 Communications can be altered, examined and exploited.
 There is a growing need to protect private information
crossing the public networks that make up the Internet
infrastructure.
 IPSec is a set of protocols and methodologies to create
secure IP connections.
41
dept. of ECE
Questions?
42
dept. of ECE

More Related Content

PPT
ip.ppt
PPT
Ip security
PPT
Overview of ip_security by JetArvind kumar Madhukar
PPTX
IPSec and VPN
PDF
IP Security One problem with Internet protocol (IP) is that it has.pdf
PDF
Network security on Cisco routers and switches
PPTX
IP Security
ip.ppt
Ip security
Overview of ip_security by JetArvind kumar Madhukar
IPSec and VPN
IP Security One problem with Internet protocol (IP) is that it has.pdf
Network security on Cisco routers and switches
IP Security

Similar to Overview of IP security power point presentation (20)

PPTX
CNS UNIT-VI.pptx
PDF
day2_research_200-250.pdfday2_research_200-250.pdfday2_research_200-250.pdf
PPTX
Ip security
PPTX
Basics of Computer Networks
PDF
Networking and communications security – network architecture design
PPTX
Module3 rnbtybtybntrbnbrtrg56g56h6yh6yh7yh5h655PPT.pptx
PDF
IS Unit 8_IP Security and Email Security
PDF
I psec cisco
PDF
Cns unit4
PDF
Cns unit4
DOCX
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
PPTX
Lec 9.pptx
PPT
4th unit bkjnkljnkjxzczczxczxczxczxvzxvzxzxv
PDF
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
PDF
PDF
Lecture14..pdf
PPT
ESP.ppt
PDF
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
PPTX
Internet protocol security
CNS UNIT-VI.pptx
day2_research_200-250.pdfday2_research_200-250.pdfday2_research_200-250.pdf
Ip security
Basics of Computer Networks
Networking and communications security – network architecture design
Module3 rnbtybtybntrbnbrtrg56g56h6yh6yh7yh5h655PPT.pptx
IS Unit 8_IP Security and Email Security
I psec cisco
Cns unit4
Cns unit4
Implementation of IPSec VPN on Cisco routers and Configuring it on ISP. (1)
Lec 9.pptx
4th unit bkjnkljnkjxzczczxczxczxczxvzxvzxzxv
Cybersecurity Tutorial | Demo On Man In The Middle Attack | Cybersecurity Tra...
Lecture14..pdf
ESP.ppt
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Internet protocol security
Ad

More from kamranahmed758536 (6)

PPTX
low pass filter power point presentation
PPTX
Hyperloop_Presentation__With_Images.pptx
PPTX
powerpoint predentation of on intersteller
PPTX
hyperloop powerpoint presentataion seminar
PPTX
vrLwNeLxTo2TvLff9AnI_Pitch Zoom Template.pptx
PPTX
IP-Fundamentals power point presentation
low pass filter power point presentation
Hyperloop_Presentation__With_Images.pptx
powerpoint predentation of on intersteller
hyperloop powerpoint presentataion seminar
vrLwNeLxTo2TvLff9AnI_Pitch Zoom Template.pptx
IP-Fundamentals power point presentation
Ad

Recently uploaded (20)

PDF
. Radiology Case Scenariosssssssssssssss
PPTX
Hypertension_Training_materials_English_2024[1] (1).pptx
PPTX
Seminar Hypertension and Kidney diseases.pptx
PPTX
BODY FLUIDS AND CIRCULATION class 11 .pptx
PPTX
Fluid dynamics vivavoce presentation of prakash
PDF
The Land of Punt — A research by Dhani Irwanto
PPT
veterinary parasitology ````````````.ppt
PPTX
CORDINATION COMPOUND AND ITS APPLICATIONS
PPTX
perinatal infections 2-171220190027.pptx
PPTX
C1 cut-Methane and it's Derivatives.pptx
PDF
Phytochemical Investigation of Miliusa longipes.pdf
PPTX
Application of enzymes in medicine (2).pptx
PDF
Warm, water-depleted rocky exoplanets with surfaceionic liquids: A proposed c...
PPTX
Microbes in human welfare class 12 .pptx
PDF
Worlds Next Door: A Candidate Giant Planet Imaged in the Habitable Zone of ↵ ...
PDF
CHAPTER 3 Cell Structures and Their Functions Lecture Outline.pdf
PDF
The scientific heritage No 166 (166) (2025)
PDF
An interstellar mission to test astrophysical black holes
PDF
Sciences of Europe No 170 (2025)
PDF
CAPERS-LRD-z9:AGas-enshroudedLittleRedDotHostingaBroad-lineActive GalacticNuc...
. Radiology Case Scenariosssssssssssssss
Hypertension_Training_materials_English_2024[1] (1).pptx
Seminar Hypertension and Kidney diseases.pptx
BODY FLUIDS AND CIRCULATION class 11 .pptx
Fluid dynamics vivavoce presentation of prakash
The Land of Punt — A research by Dhani Irwanto
veterinary parasitology ````````````.ppt
CORDINATION COMPOUND AND ITS APPLICATIONS
perinatal infections 2-171220190027.pptx
C1 cut-Methane and it's Derivatives.pptx
Phytochemical Investigation of Miliusa longipes.pdf
Application of enzymes in medicine (2).pptx
Warm, water-depleted rocky exoplanets with surfaceionic liquids: A proposed c...
Microbes in human welfare class 12 .pptx
Worlds Next Door: A Candidate Giant Planet Imaged in the Habitable Zone of ↵ ...
CHAPTER 3 Cell Structures and Their Functions Lecture Outline.pdf
The scientific heritage No 166 (166) (2025)
An interstellar mission to test astrophysical black holes
Sciences of Europe No 170 (2025)
CAPERS-LRD-z9:AGas-enshroudedLittleRedDotHostingaBroad-lineActive GalacticNuc...

Overview of IP security power point presentation

  • 1. Internet Protocol Security An Overview of IPSec 1 dept. of ECE
  • 2. Outline:  What Security Problem? - Kamran ahmed  Understanding TCP/IP. - Kamran ahmed  Security at What Level? -  IP Security.  IPSec Security Services.  Modes of operation.  IPSec Security Protocols.  Outbound/Inbound IPSec Processing.  Real World Deployment Examples. 2 dept. of ECE
  • 3. What Security Problem? Today's Internet is primarily comprised of :  Public  Un-trusted  Unreliable IP networks Because of this inherent lack of security, the Internet is subject to various types of threats… 3 dept. of ECE
  • 4. Internet Threats  Data integrity The contents of a packet can be accidentally or deliberately modified.  Identity spoofing The origin of an IP packet can be forged.  Anti-reply attacks Unauthorized data can be retransmitted.  Loss of privacy The contents of a packet can be examined in transit. 4 dept. of ECE
  • 5. Understanding TCP/IP OSI Reference Model Application Layer Transport Layer Network Layer Physical Layer Presentation Layer Session Layer Logical Link Layer TCP, UDP IP Network Adapter Device Driver Application HTTP SMTP FTP SNMP NFS FTP DNS 5 dept. of ECE 2024-25
  • 6. Understanding TCP/IP Encapsulation of Data for Network Delivery Original Message Application Layer 6 dept. of ECE
  • 7. Understanding TCP/IP Encapsulation of Data for Network Delivery Original Message Data 3 Application Layer Transport Layer (TCP, UDP) 7 dept. of ECE 2024-25
  • 8. Understanding TCP/IP Encapsulation of Data for Network Delivery Original Message Data 3 Header 3 Transport Layer (TCP, UDP) Application Layer 8 dept. of ECE 2024-25
  • 9. Understanding TCP/IP Encapsulation of Data for Network Delivery Original Message Data 3 Header 3 Data 2 Transport Layer (TCP, UDP) Network Layer (IP) Application Layer 9 dept. of ECE 2024-25
  • 10. Understanding TCP/IP Encapsulation of Data for Network Delivery Original Message Data 3 Header 3 Data 2 Header 2 Transport Layer (TCP, UDP) Network Layer (IP) Application Layer 10 dept. of ECE 2024-25
  • 11. Understanding TCP/IP Encapsulation of Data for Network Delivery Original Message Data 3 Header 3 Data 2 Header 2 Transport Layer (TCP, UDP) Network Layer (IP) Data 1 Application Layer Data Link Layer 11 dept. of ECE 2024-25
  • 12. Understanding TCP/IP Encapsulation of Data for Network Delivery Original Message Data 3 Header 3 Data 2 Header 2 Transport Layer (TCP, UDP) Network Layer (IP) Data 1 Header 1 Application Layer Data Link Layer 12 dept. of ECE 2024-25
  • 13. Understanding TCP/IP Data 1 Header 1 Packet Packet Sent by Host A Data Link Layer 13 dept. of ECE 2024-25
  • 14. Understanding TCP/IP Network Layer Data Link Layer Packet Received by intermediary Router 14 dept. of ECE
  • 15. Understanding TCP/IP Data 1 Header 1 Packet Packet Received by Host B Data Link Layer 15 dept. of ECE
  • 16. Understanding TCP/IP Data 1 Header 1 De-capsulation of Data from Network Delivery Data Link Layer 16 dept. of ECE
  • 17. Understanding TCP/IP De-capsulation of Data from Network Delivery Data 1 Data Link Layer 17 dept. of ECE
  • 18. Understanding TCP/IP De-capsulation of Data from Network Delivery Data 2 Header 2 Network Layer (IP) 18 dept. of ECE
  • 19. Understanding TCP/IP De-capsulation of Data from Network Delivery Data 2 Network Layer (IP) 19 dept. of ECE
  • 20. Understanding TCP/IP De-capsulation of Data from Network Delivery Data 3 Header 3 Transport Layer (TCP, UDP) 20 dept. of ECE
  • 21. Understanding TCP/IP De-capsulation of Data from Network Delivery Data 3 Transport Layer (TCP, UDP) 21 dept. of ECE
  • 22. Understanding TCP/IP De-capsulation of Data from Network Delivery Original Message Application Layer 22 dept. of ECE
  • 23. Understanding TCP/IP De-capsulation of Data from Network Delivery Original Message Application Layer 23 dept. of ECE
  • 24. Security at What Level? Application Layer Transport Layer Network Layer Data Link Layer PGP, Kerberos, SSH, etc. Transport Layer Security (TLS) IP Security Hardware encryption 24 dept. of ECE
  • 25. Security at Application Layer (PGP, Kerberos, SSH, etc.)  Implemented in end-hosts  Advantages - Extend application without involving operating system. - Application can understand the data and can provide the appropriate security.  Disadvantages - Security mechanisms have to be designed independently of each application. 25 dept. of ECE
  • 26. Security at Transport Layer Transport Layer Security (TLS)  Implemented in end-hosts  Advantages - Existing applications get security seamlessly  Disadvantages - Protocol specific 26 dept. of ECE
  • 27. Security at Network Layer IP Security (IPSec)  Advantages - Provides seamless security to application and transport layers (ULPs). - Allows per flow or per connection security and thus allows for very fine-grained security control.  Disadvantages - More difficult to to exercise on a per user basis on a multi-user machine. 27 dept. of ECE
  • 28. Security at Data Link Layer  (Hardware encryption)  Need a dedicated link between host/routers.  Advantages - Speed.  Disadvantages - Not scalable. - Need dedicated links. 28 dept. of ECE
  • 29. IP Security (IPSec)  IPSec is a framework of open standards developed by the Internet Engineering Task Force (IETF). Creates secure, authenticated, reliable communications over IP networks 29 dept. of ECE
  • 30. IPSec Security Services  Connectionless integrity Assurance that received traffic has not been modified. Integrity includes anti-reply defenses.  Data origin authentication Assurance that traffic is sent by legitimate party or parties.  Confidentiality (encryption) Assurance that user’s traffic is not examined by non- authorized parties.  Access control Prevention of unauthorized use of a resource. 30 dept. of ECE
  • 31. IPSec Modes of Operation  Transport Mode: protect the upper layer protocols IP Header TCP Header Data Original IP Datagram IP Header TCP Header IPSec Header Data Transport Mode protected packet  Tunnel Mode: protect the entire IP payload Tunnel Mode protected packet New IP Header TCP Header IPSec Header Data Original IP Header protected protected 31 dept. of ECE
  • 32. Tunnel Mode  Host-to-Network, Network-to-Network Protected Data IPSec IP Layer SG Internet Transport Layer Application Layer IP Layer Host B Protected Data IPSec IP Layer SG Transport Layer Application Layer IP Layer Host A SG = Security Gateway 32 dept. of ECE
  • 33. Transport Mode Transport Layer Application Layer  Host-to-Host Transport Layer Application Layer IP Layer Data Link Layer IPSec Host B IP Layer Data Link Layer IPSec Host A 33 dept. of ECE
  • 34. IPSec Security Protocols  Authentication Header (AH)  Encapsulating Security Payload (ESP) 34 dept. of ECE
  • 35. IPSec Security Protocols  Authentication Header (AH) provides: - Connectionless integrity - Data origin authentication - Protection against replay attacks  Encapsulating Security Payload (ESP) provides: - Confidentiality (encryption) - Connectionless integrity - Data origin authentication - Protection against reply attacks  Both protocols may be used alone or applied in combination with each other. 35 dept. of ECE
  • 36. Outbound/Inbound IPSec Processing  The inbound and the outbound IPSec processing are completely independent. Packet 36 dept. of ECE
  • 37. SPD IPSec policies SAD SPD = Security Policy Database SAD = Security Association Database SA = Security Association Packet Outbound IPSec Processing selector 1. Drop the packet. 2. Bypass IPSec. 3. Apply IPSec. SAout 37 dept. of ECE
  • 38. SPD IPSec policies Packet Inbound IPSec Processing Case 1: If IPSec headers exists 1. Headers are processed. 2. SPD is consulted to determine if the packet can be admitted based on the Sain. SPD = Security Policy Database SAD = Security Association Database SA = Security Association 38 dept. of ECE
  • 39. SPD IPSec policies Packet Inbound IPSec Processing Case 2: If IPSec headers are absent 1. SPD is consulted to determine the type of service to afford this packet. 2. If certain traffic is required to be IPSec protected and its not it must be dropped. SPD = Security Policy Database SAD = Security Association Database SA = Security Association 39 dept. of ECE
  • 40. Real World Deployment Examples  VPNs  Wireless Internet SG Internet Encrypted / Authenticated 40 dept. of ECE
  • 41. Conclusion  The Internet was not created with security in mind.  Communications can be altered, examined and exploited.  There is a growing need to protect private information crossing the public networks that make up the Internet infrastructure.  IPSec is a set of protocols and methodologies to create secure IP connections. 41 dept. of ECE