IPSEC Overview

IP Sec VPN’s

– Authentication – They are who they say they are
– Data Integrity – No Modification
-Confidentiality – Not Able to be seen
-Anti-Replay – Play back attack

IPSEC-
-uses IKE negotiation protocol

Securiy Protocol: AH, ESP, ESP+AH
Encryption: DES, 3DES, AES
Authentication: MD5, SHA-1
Protection: DH1, DH2, DH5, DH7

Modes of Communication
-Transport Mode (encrypted at Layer4)
. | DATA | ESP | IP | L2|
– Tunnel Mode (Most Popular)
. | DATA | IP | ESP || IP | MAC |

Authentication
-Pre-shared
-Authentication Tokens
– Biometric
Encryption Keys
-Symmetric – Each Peer uses the same key to encrypt and decrypt data (Shared key), 64-256 bit
-Asymmetric – Each peer uses one key to encrypt and one to decrypt (Public and private key), 1024-15360 bit

Algorithms
-DES- 56 bit created by IBM (Symmetric)
-3DES – uses 3 DES keys to create 168 bit keys (Symmetric)
– AES – Newer and more efficient, 128/192/256 bit
-RSA – used for ‘misc’ encryption

Data Integrity
Hashing Algorithms:
-MD5
-SHA-1

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s