CSCI 465 Data Communications and Networks Lecture 26

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

Internet Protocol Security (IP Sec)
Internet Security CS457 Seminar Zhao Cheng. Security attacks interruption, interception, modification, fabrication passive attack, active attack.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Henric Johnson1 Chapter 6 IP Security Henric Johnson Blekinge Institute of Technology, Sweden
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
Henric Johnson1 Chapter 6 IP Security. Henric Johnson2 Outline Internetworking and Internet Protocols IP Security Overview IP Security Architecture Authentication.
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
Chapter 18: Network Security Business Data Communications, 5e.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Internet Protocol Security (IPSec)
Chapter 20: Network Security Business Data Communications, 4e.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
1 Chapter 6 IP Security Henric Johnson Blekinge Institute of Technology, Sweden Revised by Andrew.
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration VPNs.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
CSCE 715: Network Systems Security
/IPsecurity.ppt 1 - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall.
IP Security.  In CERTs 2001 annual report it listed 52,000 security incidents  the most serious involving:  IP spoofing intruders creating packets.
IP Security. P R E S E N T E D B Y ::: Semester : 8 ::: Year : 2009 Naeem Riaz Maria Shakeel Aqsa Nizam.
FINAL YEAR PROJECT. FINAL YEAR PROJECT IMPLEMENTATION OF VPN USING IPSEC.
1 Chapter 6 IP Security. 2 Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
Chapter 8 IP Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
1 IPv6 Security & QoS Babu Ram Dawadi. 2 Outline IP Security Overview IP Security Architecture Authentication Header Encapsulating Security Payload Combinations.
Security IPsec 1 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Layer Security Network Systems Security Mort Anvari.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Presentaion on ipsecurity Presentaion given by arun saraswat To lavkush sharma sir arun saraswat1.
第六章 IP 安全. Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
IP Security
Virtual Private Network
IPSec Detailed Description and VPN
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
IPSecurity.
Virtual Private Networks
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Virtual Private Networks
Chapter 16 – IP Security If a secret piece of news is divulged by a spy before the time is ripe, he must be put to death, together with the man to whom.
Chapter 18 IP Security  IP Security (IPSec)
Internet and Intranet Fundamentals
Internet Security CS457 Seminar Zhao Cheng
IPSec IPSec is communication security provided at the network layer.
Virtual Private Networks (VPN)
CSE565: Computer Security Lecture 23 IP Security
Cryptography and Network Security
CSCE 815 Network Security Lecture 13
IP Security - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall Slides by Henric Johnson Blekinge Institute.
IP Security - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall Slides by Henric Johnson Blekinge Institute.
Virtual Private Network (VPN)
Security Protocols in the Internet
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Topic 12: Virtual Private Networks
B. R. Chandavarkar CSE Dept., NITK Surathkal
Chapter 6 IP Security.
Cryptography and Network Security
Presentation transcript:

CSCI 465 Data Communications and Networks Lecture 26 Martin van Bommel CSCI 465 Data Communications & Networks

Virtual Private Network (VPN) A set of computers or secure networks interconnected in a secure way through encryption and other security protocols despite using unsecure networks Unsecure networks contain unauthorized users Need to prevent eavesdropping Proprietary solutions insufficient Little reassurance as to level of security Limited in choice of network devices CSCI 465 Data Communications & Networks

CSCI 465 Data Communications & Networks IPSec Security features part of Internet standards Authentication and encryption protocols Applications needing security include Branch office connectivity Remote access over Internet Extranet and intranet connections with partners E-commerce security CSCI 465 Data Communications & Networks

CSCI 465 Data Communications & Networks IPSec Functions Authentication Header For authentication only Encapsulating Security Payload (ESP) Combined authentication/encryption Key exchange function Either manual – systems administrator configures keys Or automated – on-demand key creation VPNs need both authentication/encryption CSCI 465 Data Communications & Networks

IPSec Tunnel Mode Provides protection to the entire IP Packet Original IP Packet is encrypted (ESP trailer) New packet is authenticated (ESP header) New outer IP header is added No routers along path will examine inner IP header

CSCI 465 Data Communications & Networks IP Security Scenario CSCI 465 Data Communications & Networks

CSCI 465 Data Communications & Networks Benefits of IPSec Provides strong security for external traffic Resistant to bypass Operates below transport layer hence transparent to applications Can be transparent to end users Can provide security for individual users if needed CSCI 465 Data Communications & Networks