Download as pdf or txt
Download as pdf or txt
You are on page 1of 18

CSE 4215

Chapter 4
Internet Protocol Security
(IPSec)
Internet Protocol Security (IPSec)
Introduction
Internet Protocol Security (IPSec)
Network Security Layer

* IETF: Internet Engineering Task Force


Internet Protocol Security (IPSec)
Example

Here two nodes wants to communicate, whatever the route of data transfer, there is a logical connection
between these two nodes. The IPSec layer exists between Transport and Network layer.
Internet Protocol Security (IPSec)
Tunnel Mode

Here IPSec layer is the part of Network layer


Internet Protocol Security (IPSec)
Authentication Header Protocol
Internet Protocol Security (IPSec)
Authentication Header Protocol
Internet Protocol Security (IPSec)
Authentication Header Protocol
IPH Payload

IPH AH Payload

IPH AH Payload Padding

Hashing

MD
Internet Protocol Security (IPSec)
Encapsulating Security Payload (ESP)
Internet Protocol Security (IPSec)
Security Association (SA)

S
Suppose S.Node wants to send message to R.Node -… R

S
-… -… R

S -…
-… R S
-… R

S
-… R
S
Here every router knows the sender and receiver -… R
Internet Protocol Security (IPSec)
Security Association (SA)

2
Suppose S.Node wants to send message to R.Node

S R1
R R2
-…

-…

S R1
R R2

Here no router knows the sender and receiver


Internet Protocol Security (IPSec) Protocols
IPSec is the combinations of protocols (ESP, AH, IKE) Authentication Header (AH)

Service Provided • Security Parameter Index: Client Service Code


i) ESP: Confidentiality, Authenticity & Integrity • Sequence Number: Data Packet Number
ii) AH: Authenticity & Integrity • Authentication Data: Authentication Algo implemented
iii) IKE: Key related
Internet Protocol Security (IPSec) Protocols
Security Association
Internet Protocol Security (IPSec) Protocols
Security Association
Internet Protocol Security (IPSec) Protocols
Security Association Database
Internet Protocol Security (IPSec) Protocols
Security Policy Database
Internet Protocol Security (IPSec) Protocols
Security Policy Database
Internet Key Exchange (IKE)
Internet Protocol Security (IPSec) Protocols
Packet Tracer Application

Ipsec is implemented between


R1 and R2.
For configuration follow the
file con_ipsec_PT.txt

You might also like