11 SECURING NETWORK TRAFFIC WITH IPSEC Chapter 6.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Internet Security CS457 Seminar Zhao Cheng. Security attacks interruption, interception, modification, fabrication passive attack, active attack.
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
IPSec In Depth. Encapsulated Security Payload (ESP) Must encrypt and/or authenticate in each packet Encryption occurs before authentication Authentication.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Chapter 10 Securing Windows Server 2008 MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration.
Security at the Network Layer: IPSec
NAT TRAVERSAL FOR IPSEC Research Seminar on Datacommunications Software HIIT
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
IPsec: Internet Protocol Security Chong, Luon, Prins, Trotter.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Internet Protocol Security (IPSec)
Security Data Transmission and Authentication
What is in Presentation What is IPsec Why is IPsec Important IPsec Protocols IPsec Architecture How to Implement IPsec in linux.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 9: Securing Network Traffic Using IPSec.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
1 Chapter 6: Proxy Server in Internet and Intranet Designs Designs That Include Proxy Server Essential Proxy Server Design Concepts Data Protection in.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
CSCE 715: Network Systems Security
Information management 1 Groep T Leuven – Information department 1/26 IPSec IP Security (IPSec)
IT:Network:Apps.  RRAS does nice job of routing ◦ NAT is nice ◦ BASIC firewall ok but somewhat weak  Communication on network (WS to SRV) is in clear.
Karlstad University IP security Ge Zhang
Module 8: Planning and Troubleshooting IPSec. Overview Understanding Default Policy Rules Planning an IPSec Deployment Troubleshooting IPSec Communications.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
Hands-On Microsoft Windows Server 2003 Networking Chapter 9 IP Security.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Securing Network Communications Using IPSec Chapter Twelve.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 10: Planning and Managing IP Security.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Network Layer Security Network Systems Security Mort Anvari.
Computer Science and Engineering Computer System Security CSE 5339/7339 Session 27 November 23, 2004.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Security Data Transmission and Authentication Lesson 9.
第六章 IP 安全. Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
IPsec Problems and Solutions
Chapter 5 Network Security Protocols in Practice Part I
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
Chapter 18 IP Security  IP Security (IPSec)
SECURING NETWORK TRAFFIC WITH IPSEC
Internet and Intranet Fundamentals
IT443 – Network Security Administration Instructor: Bo Sheng
Internet Security CS457 Seminar Zhao Cheng
UNIT.4 IP Security.
Module 8: Securing Network Traffic by Using IPSec and Certificates
IPSec IPSec is communication security provided at the network layer.
CSE565: Computer Security Lecture 23 IP Security
Cryptography and Network Security
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
תרגול 11 – אבטחה ברמת ה-IP – IPsec
Sheila Frankel Systems and Network Security Group, ITL
Security Protocols in the Internet
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Module 8: Securing Network Traffic by Using IPSec and Certificates
Chapter 6 IP Security.
Cryptography and Network Security
Presentation transcript:

11 SECURING NETWORK TRAFFIC WITH IPSEC Chapter 6

Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC2 GOALS OF IPSEC  Protects the contents of IP packets  Provides defense against network attacks  Protects the contents of IP packets  Provides defense against network attacks

Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC3 PROTECTING AGAINST SECURITY ATTACKS

Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC4 WHAT IS IPSEC? IPSec is an architectural framework that provides cryptographic security services for IP packets.

Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC5 IPSEC SECURITY FEATURES  Automatic security association (SA)  IP packet filtering  Network layer security  Peer authentication  Data origin authentication  Data integrity  Data confidentiality  Anti-replay  Key management  Automatic security association (SA)  IP packet filtering  Network layer security  Peer authentication  Data origin authentication  Data integrity  Data confidentiality  Anti-replay  Key management

Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC6 NEW IPSEC FEATURES IN MICROSOFT WINDOWS SERVER 2003  The IP Security Monitor snap-in  Stronger cryptographic master key  The Netsh command-line tool  Computer startup security  Persistent policies  Improved IPSec functionality over Network Address Translation (NAT)  Improved load balancing  Resultant Set of Policies (RSoP)  The IP Security Monitor snap-in  Stronger cryptographic master key  The Netsh command-line tool  Computer startup security  Persistent policies  Improved IPSec functionality over Network Address Translation (NAT)  Improved load balancing  Resultant Set of Policies (RSoP)

Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC7 IPSEC PROTOCOLS  Authentication Header (AH)  Encapsulating Security Payload (ESP)  Authentication Header (AH)  Encapsulating Security Payload (ESP)

Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC8 IPSEC MODES  Transport mode  Tunnel mode  Transport mode  Tunnel mode

Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC9 SECURITY ASSOCIATIONS (SAs)  Internet Security Association and Key Management Protocol (ISAKMP)  IPSec  Security Parameters Index (SPI)  Internet Security Association and Key Management Protocol (ISAKMP)  IPSec  Security Parameters Index (SPI)

Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC10 INTERNET KEY EXCHANGE (IKE)  Oakley Key Determination Protocol  Diffie-Hellman key exchange  Dynamic rekeying  Oakley Key Determination Protocol  Diffie-Hellman key exchange  Dynamic rekeying

Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC11 IPSEC POLICY AGENT SERVICE

Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC12 IPSEC DRIVER

Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC13 SECURITY NEGOTIATION PROCESS

Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC14 IPSEC SECURITY POLICIES

Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC15 COMPONENTS OF IPSEC POLICIES

Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC16 DEFAULT IPSEC SECURITY POLICIES  Server (Request Security)  Client (Respond Only)  Secure Server (Require Security)  Server (Request Security)  Client (Respond Only)  Secure Server (Require Security)

Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC17 DEPLOYING IPSEC POLICIES  Using local policies  Using the Active Directory directory service  Mixed-mode environment  Persistent policies  Using local policies  Using the Active Directory directory service  Mixed-mode environment  Persistent policies

Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC18 IMPLEMENTING IPSEC USING CERTIFICATES  X.509 certificates  Role of a certification authority (CA)  X.509 certificates  Role of a certification authority (CA)

Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC19 CONFIGURING IPSEC TO USE A CERTIFICATE

Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC20 IPSEC AND NAT  Problems associated with IPSec and NAT  IKE over NAT  Problems associated with IPSec and NAT  IKE over NAT

Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC21 MONITORING IPSEC USING IP SECURITY MONITOR

Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC22 IPSEC-RELATED EVENTS IN EVENT VIEWER

Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC23 USING NETSH AND NETDIAG TO MANAGE AND MONITOR IPSEC

Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC24 SUMMARY  The purpose and features of IPSec in a Windows Server 2003 environment  IPSec protocols—AH and ESP  IPSec modes—transport and tunnel  SAs  IKE  IPSec Policy Agent  The purpose and features of IPSec in a Windows Server 2003 environment  IPSec protocols—AH and ESP  IPSec modes—transport and tunnel  SAs  IKE  IPSec Policy Agent

Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC25 SUMMARY (continued)  IPSec security policies  Deploying IPSec security policies  IPSec and NAT  Tools for managing and monitoring IPSec  IPSec security policies  Deploying IPSec security policies  IPSec and NAT  Tools for managing and monitoring IPSec