Download
slide1 n.
Skip this Video
Loading SlideShow in 5 Seconds..
Chapter 31 PowerPoint Presentation

Chapter 31

74 Views Download Presentation
Download Presentation

Chapter 31

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Chapter 31 Security Protocolsin the Internet

  2. 31.1 IP Level Security Security Association Two Modes Two Security Protocols Authentication Header (AH) Encapsulating Security Payload (ESP)

  3. Figure 31.1Transport mode

  4. Figure 31.2Tunnel mode

  5. Figure 31.3AH

  6. Note: The AH protocol provides source authentication and data integrity, but not privacy.

  7. Figure 31.4ESP

  8. Note: ESP provides source authentication, data integrity, and privacy.

  9. 31.2 Transport Layer Security Position of TLS Two Protocols

  10. Figure 31.5Position of TLS

  11. Figure 31.6Handshake protocol

  12. 31.3 Application Layer Security Pretty Good Privacy

  13. Figure 31.7PGP at the sender site

  14. Figure 31.8PGP at the receiver site

  15. 31.4 Firewalls Packet-Filter Firewalls Proxy Firewalls

  16. Figure 31.9Firewall

  17. Figure 31.10Packet-filter firewall

  18. Note: A packet-filter firewall filters at the network or transport layer.

  19. Figure 31.11Proxy firewall

  20. Note: A proxy firewall filters at the application layer.

  21. 31. 5 Virtual Private Networks Private Networks Achieving Privacy VPN Technology

  22. Table 31.1 Addresses for private networks

  23. Figure 31.12Private network

  24. Figure 31.13Hybrid network

  25. Figure 31.14Virtual private network

  26. Figure 31.15Addressing in a VPN