Presentation is loading. Please wait.

Presentation is loading. Please wait.

McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.

Similar presentations


Presentation on theme: "McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet."— Presentation transcript:

1 McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet

2 McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 31.1 IP Level Security Security Association Two Modes Two Security Protocols Encapsulating Security Payload (ESP) Authentication Header (AH)

3 McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Figure 31.1 Transport mode

4 McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Figure 31.2 Tunnel mode

5 McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Figure 31.3 AH

6 McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 The AH protocol provides source authentication and data integrity, but not privacy. Note:

7 McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Figure 31.4 ESP

8 McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 ESP provides source authentication, data integrity, and privacy. Note:

9 McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 31.2 Transport Layer Security Position of TLS Two Protocols

10 McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Figure 31.5 Position of TLS

11 McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Figure 31.6 Handshake protocol

12 McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 31.3 Application Layer Security Pretty Good Privacy

13 McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Figure 31.7 PGP at the sender site

14 McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Figure 31.8 PGP at the receiver site

15 McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 31.4 Firewalls Packet-Filter Firewalls Proxy Firewalls

16 McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Figure 31.9 Firewall

17 McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Figure 31.10 Packet-filter firewall

18 McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 A packet-filter firewall filters at the network or transport layer. Note:

19 McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Figure 31.11 Proxy firewall

20 McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 A proxy firewall filters at the application layer. Note:

21 McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 31. 5 Virtual Private Networks Private Networks Achieving Privacy VPN Technology

22 McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Table 31.1 Addresses for private networks PrefixRangeTotal 10/8 10.0.0.0 to 10.255.255.255 2 24 172.16/12 172.16.0.0 to 172.31.255.255 2 20 192.168/16 192.168.0.0 to 192.168.255.255 2 16

23 McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Figure 31.12 Private network

24 McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Figure 31.13 Hybrid network

25 McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Figure 31.14 Virtual private network

26 McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Figure 31.15 Addressing in a VPN


Download ppt "McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet."

Similar presentations


Ads by Google