Chapter 8 - IPsec
Chapter 8 - IPsec
Chapter 8 - IPsec
Chapter 8
1
Chapter Overview
2
What is Internet Protocol Security (IPsec)?
network.
It is an open-standards framework for securing network
communications.
IPsec is built in to most operating systems.
IPsec helps provide much better security than previous
protection methods.
Network administrators who use it do not have to
3
What is Internet Protocol Security (IPsec)?
What Is IPSec?
Tunnel Mode
Can use tunnel mode to
secure traffic between
two networks
Router Router
Transport Mode
Can use transport mode
to secure traffic between
any two hosts
Router
4
IPsec VPNs
VPN Benefits:
• Remote Access
• Cost Savings
• Enhanced Security
• Scalability
5
IPsec VPNs
6
IPsec Technologies
IPsec Implementation
IPsec Framework Examples
7
Confidentiality
Confidentiality with Encryption:
8
Confidentiality (Cont.)
Encryption Algorithms:
9
Integrity
Hash Algorithms
Security of Hash
Algorithms
10
Authentication
Peer Authentication
Methods
PSK
11
Authentication (Cont.)
RSA
12
Secure Key Exchange
Diffie-Hellman Key Exchange
13
IPsec Protocol Overview
14
Authentication Header
AH Protocols
15
Authentication Header (Cont.)
17
ESP Encrypts and Authenticates
18
Transport and Tunnel Modes
19
Transport and Tunnel Modes (Cont.)
20
NAP with IPsec Enforcement Components
21
How IPsec Enforcement Works
• NAP enforcement
• Network restriction
• Remediation
22
IPsec Enforcement for Logical Networks
23
IPsec Enforcement for Logical Networks
25
Recommended Uses of IPsec
26
Tools You Can Use to Monitor IPsec
• IP Security Monitor
• IPsecmon
• Windows Firewall with Advanced Security MMC
• Detailed IKE tracing using Netsh
27
IPsec Troubleshooting Process
• Stop the IPscc Policy Agent and use the ping command to verify
communications
• Verify firewall settings.
• Start the IPsec Policy Agent and use IP Security Monitor to determine
if a security association exists.
• Verify that the policies are assigned.
• Review the policies and ensure they are compatible.
• Use IP Security Monitor to ensure that any changes are applied.
28
Thanks!
29