13IPSec & VPN Types & Operating Modes
13IPSec & VPN Types & Operating Modes
4
IP Sec Mechanisms
• General IP Security mechanisms provides:
– authentication
– Confidentiality
– Integrity
– key management
• applicable to use over LANs, across public &
private WANs, & for the Internet
IP Sec Uses
Benefits of IP Sec
• In a firewall/router it provides strong security
to all traffic crossing the perimeter
• In a firewall/router is resistant to bypass
• It is below the transport layer, hence
transparent to users applications.
• can be transparent to end users
• can provide security for individual users
• secures routing architecture
IP Sec Architecture
• mandatory in IPv6, optional in IPv4
• have two security header extensions:
– Authentication Header - AH is the
authenticating protocol
– Encapsulating Security Payload - ESP is an
authenticating and encrypting protocol that uses
cryptographic mechanisms to provide source
authentication, confidentiality, and message integrity
– Key Exchange function
• VPNs want both authentication/encryption
– hence usually use ESP
Authentication Header (AH)
Raymond Panko
12
IPsec Operation: Transport Mode
1.
End-to-End
Security
(Good)
2. 3.
Security in Setup Cost
Site Network On Each Host
(Good) (Costly)
IPsec Operation: Tunnel Mode
2. 3.
No Security in No Setup Cost
Site Network On Each Host
(Bad) (Good)
14
Comparing IPsec Transport and Tunnel Modes
Characteristic Transport Mode Tunnel Mode
Uses an IPsec VPN No Yes
Gateway?
Cryptographic All the way from the Only over the Internet
Protection source host to the between the IPsec
destination host, gateways. Not within
including the Internet the two site networks.
and the two site
networks.(E2E)
Raymond Panko
Copyright Pearson Prentice-Hall 2010 15
The Figure shows the high-level view of the steps of setting
up an IPSec connection.
Security Associations (SA)
• A one-way (hash) relationship between sender &
receiver that affords security for traffic flow
• Defined by 3 parameters:
– Security Parameters Index (SPI)
– IP Destination Address
– Security Protocol Identifier
• Has a number of other parameters
– sequence no, AH & EH info, lifetime etc
• Have a database of Security Associations
• Each device will have at least one security
association (SA) for each secure connection it
uses.
IPsec SA
Raymond Panko
18
IPsec SA ….
When two devices complete their handshaking
process, which means they have agreed upon a long
list of parameters they will use to communicate,
these data must be recorded and stored somewhere
(db), which is in the SA. The SA can contain the
authentication and encryption keys, the agreed-
upon algorithms, the key lifetime (expiry/renewal),
and the source IP address.
Key Management
• handles key generation & distribution
• typically need 2 pairs of keys
– 2, per direction for AH & ESP
• manual key management
– SysAdmin manually configures every system
• automated key management
– automated system for on demand creation of keys
for SA’s in large systems (large networks)
– has Oakley & ISAKMP elements
Virtual Private Networks (VPNs)
Raymond Panko
Copyright Pearson Prentice-Hall 2010 22
ISAKMP & OAKLEY