Download presentation
Presentation is loading. Please wait.
Published byAdrian Lynch Modified over 9 years ago
1
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet
2
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 31.1 IP Level Security Security Association Two Modes Two Security Protocols Encapsulating Security Payload (ESP) Authentication Header (AH)
3
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Figure 31.1 Transport mode
4
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Figure 31.2 Tunnel mode
5
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Figure 31.3 AH
6
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 The AH protocol provides source authentication and data integrity, but not privacy. Note:
7
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Figure 31.4 ESP
8
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 ESP provides source authentication, data integrity, and privacy. Note:
9
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 31.2 Transport Layer Security Position of TLS Two Protocols
10
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Figure 31.5 Position of TLS
11
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Figure 31.6 Handshake protocol
12
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 31.3 Application Layer Security Pretty Good Privacy
13
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Figure 31.7 PGP at the sender site
14
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Figure 31.8 PGP at the receiver site
15
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 31.4 Firewalls Packet-Filter Firewalls Proxy Firewalls
16
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Figure 31.9 Firewall
17
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Figure 31.10 Packet-filter firewall
18
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 A packet-filter firewall filters at the network or transport layer. Note:
19
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Figure 31.11 Proxy firewall
20
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 A proxy firewall filters at the application layer. Note:
21
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 31. 5 Virtual Private Networks Private Networks Achieving Privacy VPN Technology
22
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Table 31.1 Addresses for private networks PrefixRangeTotal 10/8 10.0.0.0 to 10.255.255.255 2 24 172.16/12 172.16.0.0 to 172.31.255.255 2 20 192.168/16 192.168.0.0 to 192.168.255.255 2 16
23
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Figure 31.12 Private network
24
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Figure 31.13 Hybrid network
25
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Figure 31.14 Virtual private network
26
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Figure 31.15 Addressing in a VPN
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.