Presentation is loading. Please wait.

Presentation is loading. Please wait.

 authenticated transmission  secure tunnel over insecure public channel  host to host transmission is typical  service independent WHAT IS NEEDED?

Similar presentations


Presentation on theme: " authenticated transmission  secure tunnel over insecure public channel  host to host transmission is typical  service independent WHAT IS NEEDED?"— Presentation transcript:

1  authenticated transmission  secure tunnel over insecure public channel  host to host transmission is typical  service independent WHAT IS NEEDED? VPN appliances Knowledge of IP subnets Agreed-upon encryption algorithms Agreed-upon authentication

2 Cisco supports an IPSec version of VPN Diffie-Hellman is used to exchange keys. 3DES is used for channel. VPN connects two routers/firewalls. Transmission: Other standards Point To Point Tunneling Protocol (PPTP) Layer 2 Tunneling Protocol (L2TP)

3 Advantages Authenticity & confidentiality Even source/dest IDs are confidential Disadvantages

4  used by web browsers for secure interchange  developed by Netscape  communicates above layer 4 using sockets  simplified protocol 1) Client connects to web server via SSL (https) 2) Server returns digital certificate (public key) 3) Client browser authenticates certificate from list of trusted sites 4) Client sends E ServerPubKey (SessionKey) 5) Server extracts session key and verifies correct receipt 6) Session key used to support https exchange via selected algorithm (DES, IDEA, etc.)


Download ppt " authenticated transmission  secure tunnel over insecure public channel  host to host transmission is typical  service independent WHAT IS NEEDED?"

Similar presentations


Ads by Google