1 / 26

Chapter 31

Chapter 31. Security Protocols in the Internet. 31.1 IP Level Security. Security Association. Two Modes. Two Security Protocols. Authentication Header (AH). Encapsulating Security Payload (ESP). Figure 31.1 Transport mode. Figure 31.2 Tunnel mode. Figure 31.3 AH. Note :.

eldora
Download Presentation

Chapter 31

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 31 Security Protocolsin the Internet

  2. 31.1 IP Level Security Security Association Two Modes Two Security Protocols Authentication Header (AH) Encapsulating Security Payload (ESP)

  3. Figure 31.1Transport mode

  4. Figure 31.2Tunnel mode

  5. Figure 31.3AH

  6. Note: The AH protocol provides source authentication and data integrity, but not privacy.

  7. Figure 31.4ESP

  8. Note: ESP provides source authentication, data integrity, and privacy.

  9. 31.2 Transport Layer Security Position of TLS Two Protocols

  10. Figure 31.5Position of TLS

  11. Figure 31.6Handshake protocol

  12. 31.3 Application Layer Security Pretty Good Privacy

  13. Figure 31.7PGP at the sender site

  14. Figure 31.8PGP at the receiver site

  15. 31.4 Firewalls Packet-Filter Firewalls Proxy Firewalls

  16. Figure 31.9Firewall

  17. Figure 31.10Packet-filter firewall

  18. Note: A packet-filter firewall filters at the network or transport layer.

  19. Figure 31.11Proxy firewall

  20. Note: A proxy firewall filters at the application layer.

  21. 31. 5 Virtual Private Networks Private Networks Achieving Privacy VPN Technology

  22. Table 31.1 Addresses for private networks

  23. Figure 31.12Private network

  24. Figure 31.13Hybrid network

  25. Figure 31.14Virtual private network

  26. Figure 31.15Addressing in a VPN

More Related