Unit V - Network Layer Security Protocols
Unit V - Network Layer Security Protocols
PROTOCOLS
NETWORK LAYER PROTOCOLS
Internet Protocol Security
(IPsec)
Upon receipt of the IP datagram, the destination host notices the AH and
processes it using the AH protocol.
This has made ESP the most commonly used IPsec header.
Similar to AH, ESP begins with the source host establishing an AS which it
uses to send secure datagrams to the destination.
Next to the ESP trailer field on the datagram is the ESP Authentication Data
field.
Security Associations
In IPv6, the new extension to IPv4, the protection includes the upper
protocols, the IP address, and any IPv6 header extensions.
The IP addresses of the two IPsec hosts are in the clear because they
are needed in routing the datagram through the network.
Tunnel mode offers protection to the entire IP datagram both
in AH and ESP between two IPsec gateways.
This is possible because of the added new IP header in both
IPv4 and IPv6
Between the two gateways, the datagram is secure and the
original IP address is also secure.
However, beyond the gateways, the datagram may not be
secure.
Such protection is created when the first IPsec gateway
encapsulates the datagram including its IP address into a
new shield datagram with a new IP address of the receiving
IPsec gateway.
At the receiving gateway, the new datagram is unwrapped
and brought back to the original datagram.
This datagram, based on its original IP address, can be
passed on further by the receiving gateway, but from this
point on unprotected.
Virtual Private Networks
(VPN)
Types of VPN
IP encapsulation—
this involves enclosing TCP/IP data packets within another packet with an IP address of
either a firewall or a server that acts as a VPN endpoint.
Encryption—
is done on the data part of the packet.
Just like in SSL, the encryption can be done either in transport mode which encrypts its data
at the time of generation or tunnel mode which encrypts and decrypts data during
transmission encrypting both data and header.
Authentication—
involves creating an encryption domain which includes authenticating computers and data
packets by use for public encryption.
Security Types of VPNs
Trusted VPNs
Secure VPNs
Hybrid VPNs
Trusted VPNs
network.
used.
DES
3DES.