ch32.ppt

44
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP , VPN, and Firewalls Copyrig ht © The McGraw-Hill Companies, Inc. Permission re!ire" #or repro"!ction or "isplay .

Upload: veeraj-thakur

Post on 13-Apr-2018

221 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 1/44

Page 2: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 2/44

Page 3: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 3/44

32.3

32-1 IPSecurity (IPSec)32-1 IPSecurity (IPSec)

 IPSecurity (IPSec) is a collection of protocols designed IPSecurity (IPSec) is a collection of protocols designed

by the Internet Engineering Task Force (IETF) toby the Internet Engineering Task Force (IETF) to

 provide security for a packet at the netork level! provide security for a packet at the netork level!

Two Modes

Two Security Protocols

Security Association

Internet Key Exchange IKE!

"irtual Pri#ate $etwor% 

Topics discussed in this section"To

 pics discussed in this section"

Page 4: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 4/44

32.$

Figure 32.2 TCP#IP protocol suite and IPSec

Page 5: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 5/44

Page 6: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 6/44

32.&

IPSec in the transprt !de des nt

prtect the IP header" it nly prtectsthe in#r!atin c!in$ #r! the

transprt layer%

 $ote

Page 7: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 7/44

Page 8: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 8/4432.(

Figure 32.' Tunnel mode in action

Page 9: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 9/44

Page 10: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 10/44

Page 11: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 11/4432.11

The &' Prtcl pr(ides surceauthenticatin and data inte$rity,

)ut nt pri(acy%

 $ote

Page 12: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 12/44

Page 13: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 13/44

Page 14: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 14/44

Page 15: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 15/4432.1%

Figure 32.+  Simple inbound and outbound security associations

Page 16: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 16/4432.1&

I+* creates S&s #r IPSec%

 $ote

Page 17: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 17/44

Page 18: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 18/44

Page 19: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 19/44

Page 20: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 20/44

32.2*

Figure 32.11  &ybrid netork 

Page 21: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 21/44

Page 22: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 22/44

Page 23: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 23/44

Page 24: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 24/44

32.2$

Figure 32.1&  ocation of SS and TS in the Internet model 

Page 25: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 25/44

32.2%

Ta*le 32.3  SS cipher suite list 

Page 26: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 26/44

32.2&

Ta*le 32.3  SS cipher suite list ( continued  )

Page 27: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 27/44

32.2'

The client and the ser(er ha(e sidi##erent crypt$raphy secrets%

 $ote

Page 28: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 28/44

Page 29: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 29/44

32.2)

Figure 32.1( Four SS protocols

Page 30: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 30/44

32.3*

Figure 32.1)  &andshake Protocol 

Page 31: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 31/44

32.31

Figure 32.1+  Processing done by the *ecord Protocol 

Page 32: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 32/44

32.32

32-3 PGP32-3 PGP

+ne of the protocols to provide security at the+ne of the protocols to provide security at theapplication layer is Pretty ,ood Privacy (P,P)! P,P isapplication layer is Pretty ,ood Privacy (P,P)! P,P is

designed to create authenticated and confidentialdesigned to create authenticated and confidential

e-mails!e-mails!

Security Para/eters

Ser#ices

A Scenario

PP Algorith/s

Key ings

PP 0erti4icates

Topics discussed in this section"To pics discussed in this section"

Page 33: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 33/44

32.33

Figure 32.1,  Position of P,P in the TCP#IP protocol suite

Page 34: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 34/44

32.3$

In PGP, the sender # the !essa$e

needs t include the identi#iers # theal$rith!s used in the !essa$e as well

as the (alues # the -eys%

 $ote

Page 35: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 35/44

Page 36: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 36/44

Page 37: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 37/44

Page 38: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 38/44

Page 39: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 39/44

Page 40: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 40/44

Page 41: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 41/44

Page 42: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 42/44

Page 43: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 43/44

32.$3

Figure 32.2&  Pro0y fireall 

Page 44: ch32.ppt

7/26/2019 ch32.ppt

http://slidepdf.com/reader/full/ch32ppt 44/44