Download presentation
Presentation is loading. Please wait.
Published byArchibald Morgan Modified over 8 years ago
1
11 SECURING NETWORK TRAFFIC WITH IPSEC Chapter 6
2
Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC2 GOALS OF IPSEC Protects the contents of IP packets Provides defense against network attacks Protects the contents of IP packets Provides defense against network attacks
3
Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC3 PROTECTING AGAINST SECURITY ATTACKS
4
Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC4 WHAT IS IPSEC? IPSec is an architectural framework that provides cryptographic security services for IP packets.
5
Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC5 IPSEC SECURITY FEATURES Automatic security association (SA) IP packet filtering Network layer security Peer authentication Data origin authentication Data integrity Data confidentiality Anti-replay Key management Automatic security association (SA) IP packet filtering Network layer security Peer authentication Data origin authentication Data integrity Data confidentiality Anti-replay Key management
6
Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC6 NEW IPSEC FEATURES IN MICROSOFT WINDOWS SERVER 2003 The IP Security Monitor snap-in Stronger cryptographic master key The Netsh command-line tool Computer startup security Persistent policies Improved IPSec functionality over Network Address Translation (NAT) Improved load balancing Resultant Set of Policies (RSoP) The IP Security Monitor snap-in Stronger cryptographic master key The Netsh command-line tool Computer startup security Persistent policies Improved IPSec functionality over Network Address Translation (NAT) Improved load balancing Resultant Set of Policies (RSoP)
7
Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC7 IPSEC PROTOCOLS Authentication Header (AH) Encapsulating Security Payload (ESP) Authentication Header (AH) Encapsulating Security Payload (ESP)
8
Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC8 IPSEC MODES Transport mode Tunnel mode Transport mode Tunnel mode
9
Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC9 SECURITY ASSOCIATIONS (SAs) Internet Security Association and Key Management Protocol (ISAKMP) IPSec Security Parameters Index (SPI) Internet Security Association and Key Management Protocol (ISAKMP) IPSec Security Parameters Index (SPI)
10
Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC10 INTERNET KEY EXCHANGE (IKE) Oakley Key Determination Protocol Diffie-Hellman key exchange Dynamic rekeying Oakley Key Determination Protocol Diffie-Hellman key exchange Dynamic rekeying
11
Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC11 IPSEC POLICY AGENT SERVICE
12
Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC12 IPSEC DRIVER
13
Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC13 SECURITY NEGOTIATION PROCESS
14
Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC14 IPSEC SECURITY POLICIES
15
Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC15 COMPONENTS OF IPSEC POLICIES
16
Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC16 DEFAULT IPSEC SECURITY POLICIES Server (Request Security) Client (Respond Only) Secure Server (Require Security) Server (Request Security) Client (Respond Only) Secure Server (Require Security)
17
Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC17 DEPLOYING IPSEC POLICIES Using local policies Using the Active Directory directory service Mixed-mode environment Persistent policies Using local policies Using the Active Directory directory service Mixed-mode environment Persistent policies
18
Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC18 IMPLEMENTING IPSEC USING CERTIFICATES X.509 certificates Role of a certification authority (CA) X.509 certificates Role of a certification authority (CA)
19
Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC19 CONFIGURING IPSEC TO USE A CERTIFICATE
20
Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC20 IPSEC AND NAT Problems associated with IPSec and NAT IKE over NAT Problems associated with IPSec and NAT IKE over NAT
21
Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC21 MONITORING IPSEC USING IP SECURITY MONITOR
22
Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC22 IPSEC-RELATED EVENTS IN EVENT VIEWER
23
Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC23 USING NETSH AND NETDIAG TO MANAGE AND MONITOR IPSEC
24
Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC24 SUMMARY The purpose and features of IPSec in a Windows Server 2003 environment IPSec protocols—AH and ESP IPSec modes—transport and tunnel SAs IKE IPSec Policy Agent The purpose and features of IPSec in a Windows Server 2003 environment IPSec protocols—AH and ESP IPSec modes—transport and tunnel SAs IKE IPSec Policy Agent
25
Chapter 6: SECURING NETWORK TRAFFIC WITH IPSEC25 SUMMARY (continued) IPSec security policies Deploying IPSec security policies IPSec and NAT Tools for managing and monitoring IPSec IPSec security policies Deploying IPSec security policies IPSec and NAT Tools for managing and monitoring IPSec
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.