SlideShare a Scribd company logo
1 of 44
32.1
Chapter 32
Security in the Internet:
IPSec, SSL/TLS, PGP,
VPN, and Firewalls
Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
32.2
Figure 32.1 Common structure of three security protocols
32.3
32-1 IPSecurity (IPSec)32-1 IPSecurity (IPSec)
IPSecurity (IPSec) is a collection of protocols designedIPSecurity (IPSec) is a collection of protocols designed
by the Internet Engineering Task Force (IETF) toby the Internet Engineering Task Force (IETF) to
provide security for a packet at the network level.provide security for a packet at the network level.
Two Modes
Two Security Protocols
Security Association
Internet Key Exchange (IKE)
Virtual Private Network
Topics discussed in this section:Topics discussed in this section:
32.4
Figure 32.2 TCP/IP protocol suite and IPSec
32.5
Figure 32.3 Transport mode and tunnel modes of IPSec protocol
32.6
IPSec in the transport mode does not
protect the IP header; it only protects
the information coming from the
transport layer.
Note
32.7
Figure 32.4 Transport mode in action
32.8
Figure 32.5 Tunnel mode in action
32.9
IPSec in tunnel mode protects the
original IP header.
Note
32.10
Figure 32.6 Authentication Header (AH) Protocol in transport mode
32.11
The AH Protocol provides source
authentication and data integrity,
but not privacy.
Note
32.12
Figure 32.7 Encapsulating Security Payload (ESP) Protocol in transport mode
32.13
ESP provides source authentication,
data integrity, and privacy.
Note
32.14
Table 32.1 IPSec services
32.15
Figure 32.8 Simple inbound and outbound security associations
32.16
IKE creates SAs for IPSec.
Note
32.17
Figure 32.9 IKE components
32.18
Table 32.2 Addresses for private networks
32.19
Figure 32.10 Private network
32.20
Figure 32.11 Hybrid network
32.21
Figure 32.12 Virtual private network
32.22
Figure 32.13 Addressing in a VPN
32.23
32-2 SSL/TLS32-2 SSL/TLS
Two protocols are dominant today for providingTwo protocols are dominant today for providing
security at the transport layer: the Secure Socketssecurity at the transport layer: the Secure Sockets
Layer (SSL) Protocol and the Transport LayerLayer (SSL) Protocol and the Transport Layer
Security (TLS) Protocol. The latter is actually anSecurity (TLS) Protocol. The latter is actually an
IETF version of the former.IETF version of the former.
SSL Services
Security Parameters
Sessions and Connections
Four Protocols
Transport Layer Security
Topics discussed in this section:Topics discussed in this section:
32.24
Figure 32.14 Location of SSL and TLS in the Internet model
32.25
Table 32.3 SSL cipher suite list
32.26
Table 32.3 SSL cipher suite list (continued)
32.27
The client and the server have six
different cryptography secrets.
Note
32.28
Figure 32.15 Creation of cryptographic secrets in SSL
32.29
Figure 32.16 Four SSL protocols
32.30
Figure 32.17 Handshake Protocol
32.31
Figure 32.18 Processing done by the Record Protocol
32.32
32-3 PGP32-3 PGP
One of the protocols to provide security at theOne of the protocols to provide security at the
application layer is Pretty Good Privacy (PGP). PGP isapplication layer is Pretty Good Privacy (PGP). PGP is
designed to create authenticated and confidentialdesigned to create authenticated and confidential
e-mails.e-mails.
Security Parameters
Services
A Scenario
PGP Algorithms
Key Rings
PGP Certificates
Topics discussed in this section:Topics discussed in this section:
32.33
Figure 32.19 Position of PGP in the TCP/IP protocol suite
32.34
In PGP, the sender of the message
needs to include the identifiers of the
algorithms used in the message as well
as the values of the keys.
Note
32.35
Figure 32.20 A scenario in which an e-mail message is
authenticated and encrypted
32.36
Table 32.4 PGP Algorithms
32.37
Figure 32.21 Rings
32.38
In PGP, there can be multiple paths from
fully or partially trusted authorities to
any subject.
Note
32.39
32-4 FIREWALLS32-4 FIREWALLS
All previous security measures cannot prevent EveAll previous security measures cannot prevent Eve
from sending a harmful message to a system. Tofrom sending a harmful message to a system. To
control access to a system, we need firewalls. Acontrol access to a system, we need firewalls. A
firewall is a device installed between the internalfirewall is a device installed between the internal
network of an organization and the rest of thenetwork of an organization and the rest of the
Internet. It is designed to forward some packets andInternet. It is designed to forward some packets and
filter (not forward) others.filter (not forward) others.
Packet-Filter Firewall
Proxy Firewall
Topics discussed in this section:Topics discussed in this section:
32.40
Figure 32.22 Firewall
32.41
Figure 32.23 Packet-filter firewall
32.42
A packet-filter firewall filters at the
network or transport layer.
Note
32.43
Figure 32.24 Proxy firewall
32.44
A proxy firewall filters at the
application layer.
Note

More Related Content

What's hot

Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferChapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Wayne Jones Jnr
 
Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)
Tutun Juhana
 

What's hot (20)

Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferChapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
 
26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer26 Remote Logging_Electronic_Mail_and_File_Transfer
26 Remote Logging_Electronic_Mail_and_File_Transfer
 
Ch21
Ch21Ch21
Ch21
 
Chapter 22
Chapter 22Chapter 22
Chapter 22
 
Ch31
Ch31Ch31
Ch31
 
4d routing
4d routing4d routing
4d routing
 
Ch27
Ch27Ch27
Ch27
 
Chapter 23
Chapter 23Chapter 23
Chapter 23
 
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
21 Network Layer_Address_Mapping_Error_Reporting_and_Multicasting
 
Ch22
Ch22Ch22
Ch22
 
Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
Chapter 21
Chapter 21Chapter 21
Chapter 21
 
Ch19
Ch19Ch19
Ch19
 
Ars msr 1-intradomain
Ars msr 1-intradomainArs msr 1-intradomain
Ars msr 1-intradomain
 
Multicast address
Multicast addressMulticast address
Multicast address
 
Chap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packetsChap 06 delivery and routing of ip packets
Chap 06 delivery and routing of ip packets
 
Chapter 8: Switching
Chapter 8: SwitchingChapter 8: Switching
Chapter 8: Switching
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)Et3003 sem2-1314-9 network layers vi (routing protocols)
Et3003 sem2-1314-9 network layers vi (routing protocols)
 
08 Switching
08 Switching08 Switching
08 Switching
 

Viewers also liked

Viewers also liked (20)

Chapter 32
Chapter 32Chapter 32
Chapter 32
 
Vpn
VpnVpn
Vpn
 
12 Multiple Access
12 Multiple Access12 Multiple Access
12 Multiple Access
 
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
An Efficient Reactive Model for Resource Discovery in DHT-Based Peer-to-Peer ...
 
RTP
RTPRTP
RTP
 
30 Cryptography
30 Cryptography30 Cryptography
30 Cryptography
 
Networking
NetworkingNetworking
Networking
 
7.protocols 2
7.protocols 27.protocols 2
7.protocols 2
 
7. protocols
7. protocols7. protocols
7. protocols
 
03 internetworking
03 internetworking03 internetworking
03 internetworking
 
Transport layer security
Transport layer securityTransport layer security
Transport layer security
 
RTP
RTPRTP
RTP
 
IP Sec - Basic Concepts
IP Sec - Basic ConceptsIP Sec - Basic Concepts
IP Sec - Basic Concepts
 
Ch1: Operating System- Introduction
Ch1: Operating System- IntroductionCh1: Operating System- Introduction
Ch1: Operating System- Introduction
 
24 Congestion Control_and_Quality_of_Service
24 Congestion Control_and_Quality_of_Service24 Congestion Control_and_Quality_of_Service
24 Congestion Control_and_Quality_of_Service
 
Chap 27 next generation i pv6
Chap 27 next generation i pv6Chap 27 next generation i pv6
Chap 27 next generation i pv6
 
Advanced computer architecture lesson 1 and 2
Advanced computer architecture lesson 1 and 2Advanced computer architecture lesson 1 and 2
Advanced computer architecture lesson 1 and 2
 
Ch2: Computer System Structure (OS)
Ch2: Computer System Structure (OS)Ch2: Computer System Structure (OS)
Ch2: Computer System Structure (OS)
 
Network Layer
Network LayerNetwork Layer
Network Layer
 
Chap 28 security
Chap 28 securityChap 28 security
Chap 28 security
 

Similar to 32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls

Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsAnalysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) Datagrams
Emily Jones
 
IS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email SecurityIS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email Security
Sarthak Patel
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1
MOHD ARISH
 

Similar to 32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls (20)

Ch32
Ch32Ch32
Ch32
 
Chap 21 snmp
Chap 21 snmpChap 21 snmp
Chap 21 snmp
 
Ch 31
Ch 31Ch 31
Ch 31
 
Network security on Cisco routers and switches
Network security on Cisco routers and switchesNetwork security on Cisco routers and switches
Network security on Cisco routers and switches
 
Chap 02 osi model
Chap 02 osi modelChap 02 osi model
Chap 02 osi model
 
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the  data importance on ...A dynamic data encryption method based on addressing the  data importance on ...
A dynamic data encryption method based on addressing the data importance on ...
 
Security And Privacy Issues Of Iots
Security And Privacy Issues Of IotsSecurity And Privacy Issues Of Iots
Security And Privacy Issues Of Iots
 
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeSecure Image Transmission for Cloud Storage System Using Hybrid Scheme
Secure Image Transmission for Cloud Storage System Using Hybrid Scheme
 
Analysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) DatagramsAnalysis Of Internet Protocol ( IP ) Datagrams
Analysis Of Internet Protocol ( IP ) Datagrams
 
IS - SSL
IS - SSLIS - SSL
IS - SSL
 
CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3CCNA 1 Routing and Switching v5.0 Chapter 3
CCNA 1 Routing and Switching v5.0 Chapter 3
 
IS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email SecurityIS Unit 8_IP Security and Email Security
IS Unit 8_IP Security and Email Security
 
Wireless networks security
Wireless networks securityWireless networks security
Wireless networks security
 
Webinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP seguraWebinar: Comunicação TCP/IP segura
Webinar: Comunicação TCP/IP segura
 
1643129870-internet-security.pptx
1643129870-internet-security.pptx1643129870-internet-security.pptx
1643129870-internet-security.pptx
 
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
Analysis of network_security_threats_and_vulnerabilities_by_development__impl...
 
Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1Centralized monitoring station for it computing and network infrastructure1
Centralized monitoring station for it computing and network infrastructure1
 
MATLAB Implementation of 128-key length SAFER+ Cipher System
MATLAB Implementation of 128-key length SAFER+ Cipher SystemMATLAB Implementation of 128-key length SAFER+ Cipher System
MATLAB Implementation of 128-key length SAFER+ Cipher System
 
IRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 DevicesIRJET - Cryptographic Communication between Two ESP32 Devices
IRJET - Cryptographic Communication between Two ESP32 Devices
 
Chapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and CommunicationsChapter 03 - Network Protocols and Communications
Chapter 03 - Network Protocols and Communications
 

More from Ahmar Hashmi

More from Ahmar Hashmi (19)

31 Network Security
31 Network Security31 Network Security
31 Network Security
 
27 WWW and_HTTP
27 WWW and_HTTP27 WWW and_HTTP
27 WWW and_HTTP
 
25 DNS
25 DNS25 DNS
25 DNS
 
20 Network Layer_Internet_Protocol
20 Network Layer_Internet_Protocol20 Network Layer_Internet_Protocol
20 Network Layer_Internet_Protocol
 
19 Network Layer_Logical_Addressing
19 Network Layer_Logical_Addressing19 Network Layer_Logical_Addressing
19 Network Layer_Logical_Addressing
 
18 Virtual Circuit_Networks_Frame_Relay_and_ATM
18 Virtual Circuit_Networks_Frame_Relay_and_ATM18 Virtual Circuit_Networks_Frame_Relay_and_ATM
18 Virtual Circuit_Networks_Frame_Relay_and_ATM
 
17 SONET/SDH
17 SONET/SDH17 SONET/SDH
17 SONET/SDH
 
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
16 Wireless WANs_Cellular_Telephone_and_Satellite_Networks
 
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
15 Connecting LANs_Backbone_Networks_and_Virtual_LAN
 
14 Wireless LAN
14 Wireless LAN14 Wireless LAN
14 Wireless LAN
 
13 Wired Lans_Ethernet
13 Wired Lans_Ethernet13 Wired Lans_Ethernet
13 Wired Lans_Ethernet
 
11 Data Link_Control
11 Data Link_Control11 Data Link_Control
11 Data Link_Control
 
10 Error Detection_and_Correction
10 Error Detection_and_Correction10 Error Detection_and_Correction
10 Error Detection_and_Correction
 
09 Using Telephone_and_Cable_Networks_for_Data_Transmission
09 Using Telephone_and_Cable_Networks_for_Data_Transmission09 Using Telephone_and_Cable_Networks_for_Data_Transmission
09 Using Telephone_and_Cable_Networks_for_Data_Transmission
 
07 Transmission Media
07 Transmission Media07 Transmission Media
07 Transmission Media
 
06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_Spreading06 Bandwidth Utilization_Multiplexing_and_Spreading
06 Bandwidth Utilization_Multiplexing_and_Spreading
 
05 Analog Transmission
05 Analog Transmission05 Analog Transmission
05 Analog Transmission
 
04 Digital Transmission
04 Digital Transmission04 Digital Transmission
04 Digital Transmission
 
03 Data and_Signals
03 Data and_Signals03 Data and_Signals
03 Data and_Signals
 

Recently uploaded

Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Recently uploaded (20)

How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 

32 Security in_Internet_IP_SEC_SSL/TLS_PGN_VPN_and_Firewalls