Chapter 3
Chapter 3
INTRODUCTION TO
NETWORK SECURITY
Compiled By: Mr. Navin Manandhar
■ Design an algorithm for performing the security-related transformation. The algorithm should
be such that an opponent cannot defeat its purpose.
■ Generate the secret information to be used with the algorithm.
■ Develop methods for the distribution and sharing of the secret information.
■ Specify a protocol to be used by the two principals that makes use of the security
■ Stateless firewall works by treating each packet as an isolated unit whereas State-full firewall
works by maintain context about active session and use “state information” to speed packet
processing.
■ It combines three types of firewalls (packet filtering, circuit level and application gateway).
■ Checks whether session, packets are legitimate and can evaluate the contents of packets at
application layer. (i.e. tracking logs, activities etc.)
■ Cisco PIX
State-full means
Lower admin
Destination: 202.36.57.132: 876 overhead
Update
Server
Source: 5.6.7.32: 334
■ IPSec in the transport mode does not protect the IP header, does not
■ protect the whole IP packet; it only protects the information coming from the
transport layer.
■ In this mode, the IPSec header and trailer are added to the information
■ coming from the transport layer. The IP header is added later.