Download presentation
Presentation is loading. Please wait.
Published byAndrea Garrison Modified over 8 years ago
1
authenticated transmission secure tunnel over insecure public channel host to host transmission is typical service independent WHAT IS NEEDED? VPN appliances Knowledge of IP subnets Agreed-upon encryption algorithms Agreed-upon authentication
2
Cisco supports an IPSec version of VPN Diffie-Hellman is used to exchange keys. 3DES is used for channel. VPN connects two routers/firewalls. Transmission: Other standards Point To Point Tunneling Protocol (PPTP) Layer 2 Tunneling Protocol (L2TP)
3
Advantages Authenticity & confidentiality Even source/dest IDs are confidential Disadvantages
4
used by web browsers for secure interchange developed by Netscape communicates above layer 4 using sockets simplified protocol 1) Client connects to web server via SSL (https) 2) Server returns digital certificate (public key) 3) Client browser authenticates certificate from list of trusted sites 4) Client sends E ServerPubKey (SessionKey) 5) Server extracts session key and verifies correct receipt 6) Session key used to support https exchange via selected algorithm (DES, IDEA, etc.)
Similar presentations
© 2024 SlidePlayer.com. Inc.
All rights reserved.