IPSec Flashcards
What is IPSec?
A set of communication rules or protocols for setting up secure connections over a network. Adds encryption and authentication to make the IP protocol more secure. Designed to secure data over public networks.
Where might IPSec be implemented?
1) Virtual Private Networks (VPN)
2) Branch offices
3) Partner Extranet
4) Remote Access
Explain the process of Security Associations.
o Phase 1 SA
IKE Phase 1
Main Mode
Traffic Management
No encrypted data being sent yet
* Negotiation
o What kind of key exchange
Diffie-Hellman
ECDHE
o Authentication
Certificates
PSK
o Encryption
o Session Duration
o Phase 2 SA
IKE Phase 2
Quick Mode
Data Exchange
* Set up two one-way tunnels
* Two separate data exchanges
Negotiation
* IP Sec Protocol
o AH
o ESP
* Encapsulation
* Authentication
* Session Duration
* (Optional) DH Exchange
What is IPSec Authentication Header (AH)?
It provides data integrity by using an authentication algorithm. It does not encrypt the packet. Verifies integrity. Uses IP protocol 51.
What is IPSec Encapsulating Security Payload (ESP)?
It provides origin authenticity through source authentication, data integrity through hash functions, and confidentially through encryption protection for IP packets. Uses IP protocol 50.
What is IPSec Encapsulation?
Handled by ESP or AH or both for an IPSec tunnel. Includes encrypting the data portion of the header if ESP is being used, adding the appropriate header to provide the IPSec peer with information on how to decrypt the date (for ESP), and generating hashes to be used by the peer for verifying that the data (and the IP header in the case of AH) was not tampered with. Can be done in tunnel or transport mode.
Show the difference between Transport and Tunnel Mode.
See the illustration on pg. 37 of the notes.
What is the Security Parameter Index (SPI)?
An identifier used to uniquely identify both manually and dynamically established IPSec Security Associations.
What is Internet Security Association and Key Management Protocol (ISAKMP)?
Used for negotiating, establishing, modification, and deletion of security associations and related parameters. It defines the procedures and packet formats for peer authentication creation and management of SAs and techniques for key generation.