SlideShare a Scribd company logo
IPSec In Depth
Encapsulated Security Payload
(ESP)
• Must encrypt and/or authenticate in each
packet
• Encryption occurs before authentication
• Authentication is applied to data in the
IPSec header as well as the data contained
as payload
IPSec Encapsulating Security Payload (ESP)
in Transport Mode
Data
TCP Hdr
Orig IP Hdr
Data
TCP Hdr
ESP Hdr
Orig IP Hdr ESP Trailer ESP Auth
Usually encrypted
integrity hash coverage
SecParamIndex
Padding PadLength NextHdr
Seq# Keyed Hash
22-36 bytes total
InitVector
ESP is IP protocol 50
Insert Append
© 2000 Microsoft Corporation
IPSec ESP Tunnel Mode
Data
TCP Hdr
Orig IP Hdr
ESP Auth
Usually encrypted
integrity hash coverage
Data
TCP Hdr
ESP Hdr IP Hdr
IPHdr
New IP header with source &
destination IP address
© 2000 Microsoft Corporation
ESP Trailer
Authentication Header (AH)
• Authentication is applied to the entire
packet, with the mutable fields in the IP
header zeroed out
• If both ESP and AH are applied to a packet,
AH follows ESP
IPSec Authentication Header (AH)
in Transport Mode
Data
TCP Hdr
Orig IP Hdr
Data
TCP Hdr
AH Hdr
Orig IP Hdr
Next Hdr Payload Len Rsrv SecParamIndex Keyed Hash
Integrity hash coverage (except for mutable fields in IP hdr)
Seq#
24 bytes total
AH is IP protocol 51
Insert
© 2000 Microsoft Corporation
IPSec AH Tunnel Mode
Data
TCP Hdr
Orig IP Hdr
Integrity hash coverage (except for mutable new IP hdr fields)
IP Hdr AH Hdr Data
TCP Hdr
Orig IP Hdr
New IP header with source &
destination IP address
© 2000 Microsoft Corporation
Internet Key Exchange (IKE)
• Phase I
– Establish a secure channel(ISAKMP SA)
– Authenticate computer identity
• Phase II
– Establishes a secure channel between
computers intended for the transmission of data
(IPSec SA)
Main Mode
• Main mode negotiates an ISAKMP SA
which will be used to create IPSec Sas
• Three steps
– SA negotiation
– Diffie-Hellman and nonce exchange
– Authentication
Main Mode (Kerberos)
Initiator Responder
Header, SA Proposals
Header, Selected SA Proposal
Header, D-H Key Exchange, Noncei,
Kerberos Tokeni Header, D-H Key Exchange, Noncer,
Kerberos Tokenr
Header, Idi, Hashi
Header, Idr, Hashr
Encrypted
Main Mode (Certificate)
Initiator Responder
Header, D-H Key Exchange, Noncei
Header, Idi, Certificatei, Signaturei,
Certificate Request
Header, D-H Key Exchange,
Noncer,Certificate Request
Header, Idr, Certificater,
Signaturer
Encrypted
Header, SA Proposals
Header, Selected SA Proposal
Main Mode (Pre-shared Key)
Initiator Responder
Header, D-H Key Exchange, Noncei
Header, Idi, Hashi
Header, D-H Key Exchange, Noncer
Header, Idr, Hashr
Encrypted
Header, SA Proposals
Header, Selected SA Proposal
Quick Mode
• All traffic is encrypted using the ISAKMP
Security Association
• Each quick mode negotiation results in two
IPSec Security Associations (one inbound,
one outbound)
Quick Mode Negotiation
Header, Hash
Header, Connected Notification
Encrypted
Initiator Responder
Header, IPSec Selected SA
Header, IPSec Proposed SA

More Related Content

PPT
Rooster ipsecindepth
PPT
IP security Part 1
 
DOC
Ipsec rbe guide
PPTX
IP SEC.ptx
PPTX
Cyber forensics
PDF
Working Survey of Authentication Header and Encapsulating Security Payload
PPT
Ip sec talk
PPTX
Ip security
Rooster ipsecindepth
IP security Part 1
 
Ipsec rbe guide
IP SEC.ptx
Cyber forensics
Working Survey of Authentication Header and Encapsulating Security Payload
Ip sec talk
Ip security

Similar to rooster-ipsecindepth.ppt (20)

PDF
18CS2005 Cryptography and Network Security
PDF
IPsec for IMS
PPTX
Ipsecurity
PPT
IP Sec by Amin Pathan
PDF
Unit 4_IPSec_AH_ESP_IKE_SA_Tunnel_Transport.pdf
PPTX
PPTX
IP Security
PPTX
Cryptography and network security
PPTX
Cryptography and Network security # Lecture 8
PPTX
OHCSCP1106 IPSec VPN and Its Applications ISSUE 3.0.pptx
PPT
IPSec Overview
PPT
IPSec
PPT
I psec
PPT
IP Security in Network Security NS6
PDF
IP Security
PPTX
I psecurity
PPT
Chapter 6
PPT
Ip security in i psec
PDF
IPSec (Internet Protocol Security) - PART 1
PPT
Ip Sec Rev1
18CS2005 Cryptography and Network Security
IPsec for IMS
Ipsecurity
IP Sec by Amin Pathan
Unit 4_IPSec_AH_ESP_IKE_SA_Tunnel_Transport.pdf
IP Security
Cryptography and network security
Cryptography and Network security # Lecture 8
OHCSCP1106 IPSec VPN and Its Applications ISSUE 3.0.pptx
IPSec Overview
IPSec
I psec
IP Security in Network Security NS6
IP Security
I psecurity
Chapter 6
Ip security in i psec
IPSec (Internet Protocol Security) - PART 1
Ip Sec Rev1
Ad

More from ImXaib (20)

PPTX
cellular-communication-system presentation.pptx
PPTX
informationandnetworksecurity16transpositionciphers-210723152730.pptx
PPTX
ALI HAMZAH PRESENTATION ON INFO SECURITY.pptx
PPTX
Advance Machine Learning presentation.pptx
PPTX
NEW METHODOLOGIES FOR IDENTIFYING CUSTOMER NEEDS FROM USER-GENERATED CONTENTS...
PPTX
ERD introduction in databases model.pptx
PPTX
SDA presentation the basics of computer science .pptx
PPTX
terminal a clear presentation on the topic.pptx
PPTX
What is Machine Learning_updated documents.pptx
PPTX
Grid Computing and it's applications.PPTX
PDF
Firewall.pdf
PPT
4966709.ppt
PPT
lecture2.ppt
PPTX
Tools.pptx
PPT
lec3_10.ppt
PPT
ch12.ppt
PPT
Fullandparavirtualization.ppt
PPT
mis9_ch08_ppt.ppt
PPT
Policy formation and enforcement.ppt
PPT
Database schema architecture.ppt
cellular-communication-system presentation.pptx
informationandnetworksecurity16transpositionciphers-210723152730.pptx
ALI HAMZAH PRESENTATION ON INFO SECURITY.pptx
Advance Machine Learning presentation.pptx
NEW METHODOLOGIES FOR IDENTIFYING CUSTOMER NEEDS FROM USER-GENERATED CONTENTS...
ERD introduction in databases model.pptx
SDA presentation the basics of computer science .pptx
terminal a clear presentation on the topic.pptx
What is Machine Learning_updated documents.pptx
Grid Computing and it's applications.PPTX
Firewall.pdf
4966709.ppt
lecture2.ppt
Tools.pptx
lec3_10.ppt
ch12.ppt
Fullandparavirtualization.ppt
mis9_ch08_ppt.ppt
Policy formation and enforcement.ppt
Database schema architecture.ppt
Ad

Recently uploaded (20)

PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
Complications of Minimal Access Surgery at WLH
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
STATICS OF THE RIGID BODIES Hibbelers.pdf
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PDF
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PDF
102 student loan defaulters named and shamed – Is someone you know on the list?
PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PDF
Pre independence Education in Inndia.pdf
PPTX
PPH.pptx obstetrics and gynecology in nursing
PPTX
master seminar digital applications in india
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
Module 4: Burden of Disease Tutorial Slides S2 2025
IMMUNITY IMMUNITY refers to protection against infection, and the immune syst...
O5-L3 Freight Transport Ops (International) V1.pdf
human mycosis Human fungal infections are called human mycosis..pptx
Complications of Minimal Access Surgery at WLH
Final Presentation General Medicine 03-08-2024.pptx
Microbial diseases, their pathogenesis and prophylaxis
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
STATICS OF THE RIGID BODIES Hibbelers.pdf
2.FourierTransform-ShortQuestionswithAnswers.pdf
BÀI TẬP BỔ TRỢ 4 KỸ NĂNG TIẾNG ANH 9 GLOBAL SUCCESS - CẢ NĂM - BÁM SÁT FORM Đ...
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
102 student loan defaulters named and shamed – Is someone you know on the list?
Week 4 Term 3 Study Techniques revisited.pptx
Pre independence Education in Inndia.pdf
PPH.pptx obstetrics and gynecology in nursing
master seminar digital applications in india
Microbial disease of the cardiovascular and lymphatic systems
Abdominal Access Techniques with Prof. Dr. R K Mishra

rooster-ipsecindepth.ppt

  • 2. Encapsulated Security Payload (ESP) • Must encrypt and/or authenticate in each packet • Encryption occurs before authentication • Authentication is applied to data in the IPSec header as well as the data contained as payload
  • 3. IPSec Encapsulating Security Payload (ESP) in Transport Mode Data TCP Hdr Orig IP Hdr Data TCP Hdr ESP Hdr Orig IP Hdr ESP Trailer ESP Auth Usually encrypted integrity hash coverage SecParamIndex Padding PadLength NextHdr Seq# Keyed Hash 22-36 bytes total InitVector ESP is IP protocol 50 Insert Append © 2000 Microsoft Corporation
  • 4. IPSec ESP Tunnel Mode Data TCP Hdr Orig IP Hdr ESP Auth Usually encrypted integrity hash coverage Data TCP Hdr ESP Hdr IP Hdr IPHdr New IP header with source & destination IP address © 2000 Microsoft Corporation ESP Trailer
  • 5. Authentication Header (AH) • Authentication is applied to the entire packet, with the mutable fields in the IP header zeroed out • If both ESP and AH are applied to a packet, AH follows ESP
  • 6. IPSec Authentication Header (AH) in Transport Mode Data TCP Hdr Orig IP Hdr Data TCP Hdr AH Hdr Orig IP Hdr Next Hdr Payload Len Rsrv SecParamIndex Keyed Hash Integrity hash coverage (except for mutable fields in IP hdr) Seq# 24 bytes total AH is IP protocol 51 Insert © 2000 Microsoft Corporation
  • 7. IPSec AH Tunnel Mode Data TCP Hdr Orig IP Hdr Integrity hash coverage (except for mutable new IP hdr fields) IP Hdr AH Hdr Data TCP Hdr Orig IP Hdr New IP header with source & destination IP address © 2000 Microsoft Corporation
  • 8. Internet Key Exchange (IKE) • Phase I – Establish a secure channel(ISAKMP SA) – Authenticate computer identity • Phase II – Establishes a secure channel between computers intended for the transmission of data (IPSec SA)
  • 9. Main Mode • Main mode negotiates an ISAKMP SA which will be used to create IPSec Sas • Three steps – SA negotiation – Diffie-Hellman and nonce exchange – Authentication
  • 10. Main Mode (Kerberos) Initiator Responder Header, SA Proposals Header, Selected SA Proposal Header, D-H Key Exchange, Noncei, Kerberos Tokeni Header, D-H Key Exchange, Noncer, Kerberos Tokenr Header, Idi, Hashi Header, Idr, Hashr Encrypted
  • 11. Main Mode (Certificate) Initiator Responder Header, D-H Key Exchange, Noncei Header, Idi, Certificatei, Signaturei, Certificate Request Header, D-H Key Exchange, Noncer,Certificate Request Header, Idr, Certificater, Signaturer Encrypted Header, SA Proposals Header, Selected SA Proposal
  • 12. Main Mode (Pre-shared Key) Initiator Responder Header, D-H Key Exchange, Noncei Header, Idi, Hashi Header, D-H Key Exchange, Noncer Header, Idr, Hashr Encrypted Header, SA Proposals Header, Selected SA Proposal
  • 13. Quick Mode • All traffic is encrypted using the ISAKMP Security Association • Each quick mode negotiation results in two IPSec Security Associations (one inbound, one outbound)
  • 14. Quick Mode Negotiation Header, Hash Header, Connected Notification Encrypted Initiator Responder Header, IPSec Selected SA Header, IPSec Proposed SA