0% found this document useful (0 votes)
24 views8 pages

91 IPSec+Protocols

Uploaded by

albahith
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
24 views8 pages

91 IPSec+Protocols

Uploaded by

albahith
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

IPSec Protocols:

o IPSec is a security VPN term, which is stands for Internet Protocol Security.
o IPSec is an open standard that enables secure and encrypted communication.
o IPSec is an open standard, almost all Firewall and Router vendors support them.
o IPSec is suit of protocols that provide data confidentiality, integrity, & authentication.
o IPSec is used both for remote access VPNs and Site-to-Site Virtual Private Networks.
o IPSec is used to build VPNs over the Internet or over any other non-secure networks.
o IPSec (Internet Protocol Security) works at the Network Layer of OSI reference Model.
o In IPSec VPN, only unicast IP traffic can pass through the Virtual Privat Network tunnel.
o IPSec encrypting & authenticate Internet Protocol packets between participating devices.
o IPsec is a framework that helps us to protect Internet Protocol traffic on Network Layer.

IPSec Features:
Confidentiality:
o By encrypting data, nobody except the sender & receiver will be able to read the data.
o Encryption algorithms protect data so it cannot be read by a third party while in transit.
o It mean the data will keep as secret using encryption algorithm Like DES, 3DES, AES etc.
Integrity:
o IPSec Integrity provide to make sure that nobody changes the data in packets.
o Receiver can authenticate packets sent by sender to ensure data has not been altered.
o By calculating hash value, the sender & receiver will be able to check data is not alerted.
o IPSec integrity insure that the data has not been altered during the transmission.
o Internet Protocol Security (IPSec) Integrity using hash algorithm such as MD5 and SHA.
Authentication:
o Authentication means both devices will authenticate each other before data exchange.
o Authentication algorithms verify the data integrity and authenticity of a message.
o IPSec Authentication using Pre-Shared or Certificate (PKI) to authenticate peer.
o The IPSec receiver can authenticate the source of the IPSec packets sent.
o IPSec Authentication make sure that we are really talking with the device we intend to.
Anti-Replay:
o Attacker could try to capture these packets and send them again.
o Each packet is unique, has not been duplicated or intercepted.
o By using sequence numbers, IPsec will not transmit any duplicate packets.
o It means that if the data arrive late it will consider as alter & it will be drop.

1 | P a g e Created by Ahmad Ali E-Mail: [email protected] , Mobile: 056 430 3717


IPSec Protocols:
Encapsulating Security Payload (ESP):
o IPSec uses ESP to provide Data Integrity, Encryption and Authentication.
o Internet Protocol Security uses ESP to provide also Anti-Replay functions.
o IPSec implementations uses DES, 3DES and AES for Data Encryption.
o ESP authenticates the data within the VPN, ensuring Data Integrity.
o ESP (Encapsulating Security Payload) provides all IPsec features.
o ESP (Encapsulating Security Payload) use IP protocol number 50.
o ESP (Encapsulating Security Payload) work with NAT using NAT-T.
o ESP protocols support two modes of use Transport and Tunnel.
o In Transport Mode, it use the original IP header & insert an ESP header.
o In Tunnel Mode, it use a new IP header, which is useful for site-to-site VPNs.
o Same to transport mode but add new header, original header is also encrypted.

2 | P a g e Created by Ahmad Ali E-Mail: [email protected] , Mobile: 056 430 3717


Authentication Header (AH):
o IPSec uses AH to provide Data Integrity and Authentication functions.
o IPSec uses AH to provide Anti-Replay functions for IPSec VPN.
o IPSec Authentication Header (AH) does not provide any Data Encryption.
o AH is used to provide Data Integrity services to ensure Data is not tampered.
o Authentication Header (AH) use IP protocol number 51.
o Authentication Header (AH) does not works with NAT.
o Authentication Header (AH) does not use NAT-T.
o AH, protocols also support two modes of use Transport and Tunnel.
o Transport mode is simple, it just adds an AH header after the IP header.
o With tunnel mode, it add new IP header on top of the original IP packet.

3 | P a g e Created by Ahmad Ali E-Mail: [email protected] , Mobile: 056 430 3717


IPSec Modes:
o There is two modes of IPSec, Tunnel Mode and Transport Mode:
Tunnel Mode:
o In Tunnel Mode, the entire packet is encrypts and authenticates by IPSec.
o IP Security (IPSec) tunnel mode is the default mode on most Cisco devices.
o The packet is then encapsulated to form a new IP packet header information.
o IP Security (IPSec) Tunnel Mode protect Layer 3 and upper Layer data.
o IPSec Tunnel Mode is used in Site-Site VPN, Remote-Access VPN and GETVPN.
o Tunnel mode is more secure and encrypts both the header and the payload.
o Tunnel mode is used to encrypt traffic between secure IPSec Gateways.

Transport Mode:
o IPSec only encrypts and/or authenticates the actual payload of the packet.
o In Transport mode, the header information remains unchanged.
o IPSec Transport mode is used for end-to-end communications.
o IPSec Transport mode is used for communication between client & server.
o IPSec Transport mode is used for communication between a workstation.
o Normally, encrypted Telnet or RDP session from workstation to server.
o IPSec Transport mode protect Layer 4 and upper Layer data.
o IPSec Transport Mode will use the original IP header.
o IPSec transport mode is used when another tunneling protocol like GRE is used.
o IPSec Transport Mode is used in Dynamic Multipoint Virtual Private Network.

4 | P a g e Created by Ahmad Ali E-Mail: [email protected] , Mobile: 056 430 3717


IPSec Authentication:
MD5 Hashing:
o Hashing is the technique to ensure the integrity.
o MD5, which stands for Message Digest algorithm 5.
o The Message Digest (MD5) is a cryptographic hashing algorithm.
o MD5 hash is typically expressed as a 32-digit hexadecimal number.
o MD5 or message digest algorithm will produce a 128-bit hash value.
o Input data can be of any size or length, but the output size is always fixed.
o MD5 algorithm generates a fixed size (32 Digit Hex) MD5 hash.
o The hash is unique for every file irrespective of its size and type.

SHA Hashing:
o SHA, stands for Secure Hash Algorithm, is cryptographic hashing.
o SHA used to determine the integrity of a particular piece of data.
o The Secure Hashing Algorithm comes in several flavors.
o SHA-1 and SHA-2 are two different versions of that algorithm.
o SHA1 produces a 160-bit (20-byte) hash value.
o SHA2 has option to vary digest between 224 bits to 512 bits.
o SHA224 produces a 224-bit (28-byte) hash value.
o SHA256 produces a 256-bit (32-byte) hash value.
o SHA384 produces a 384-bit (48-byte) hash value.
o SHA512 produces a 512-bit (64-byte) hash value.

IPSec Encryption:
IPSec provide many Encryption methods mostly used are DES, 3DES & AES.
DES Encryption Algorithm:
o DES stands for Data Encryption Standard, its Encryption Algorithm.
o DES was developed by IBM in 1970s but was later adopted by the NIST.
o DES (Data Encryption Standard) key length is 56 bits & block size is 64-bit length.
o Data Encryption Standard uses 56-bit key, ensuring high-performance encryption.
o DES is not a secure encryption algorithm and it was cracked many times.
o DES is one of the most widely accepted, publicly available cryptographic systems.
o DES (Data Encryption Standard) is used to encrypt and decrypt packet data.
o DES turns clear text into ciphertext with an encryption algorithm.
o The decryption algorithm on the remote end restores clear text from ciphertext.
o DES shared secret keys enable the encryption and decryption on both sides.
o DES (Data Encryption Standard) is the weakest of the three algorithms.

5 | P a g e Created by Ahmad Ali E-Mail: [email protected] , Mobile: 056 430 3717


Triple DES Algorithm (3DES):
o Encryption algorithm based on DES that uses DES to encrypt the data three times.
o In 3DES, Data Encryption Standard encryption is applied three times to the plaintext.
o Plaintext is encrypted with key A, decrypted with key B & encrypted again with key C.
o Triple DES (3DES) is also supported encryption protocol for use in IPSec on Cisco products.
o Triple DES (3DES) operates similarly to DES in that data is broken into 64-bit blocks.
o 3DES then processes each block three times, each time with an independent 56-bit key.
o Triple DES effectively doubles encryption strength over 56-bit Data Encryption Standard.
o Triple DES is a variation of DES, which is secure than the usual Data Encryption Standard.

AES (Advanced Encryption Standard):


o AES (Advanced Encryption Standard) is strongest encryption algorithm available.
o Advance Encryption Standard (AES) algorithm was developed in the Year 1998.
o Advanced Encryption Standard (AES) is a newer and stronger encryption standard
o Firewalls can use AES encryption keys of these lengths: 128, 192, or 256 bits.
o Algorithm is referred to as AES-128, AES-192, or AES-256, depending on the key length.

6 | P a g e Created by Ahmad Ali E-Mail: [email protected] , Mobile: 056 430 3717


Diffie-Hellman (DH):
o Diffie-Hellman key agreement algorithm was developed in the Year 1976.
o Dr. Whitfield Diffie and Dr. Martin Hellman developed Diffie-Hellman Algorithm.
o Diffie-Hellman (DH) key exchange is a wonderful mathematical algorithm.
o Which allows two parties who have no prior knowledge to generate same secret keys.
o Diffie-Hellman allows two devices to establish a shared secret over an unsecure network.
o The encryption key for the two devices is used as a symmetric key for encrypting data.
o Diffie-Hellman key agreement algorithm is widely used in security protocols like IPSec.
o Diffie-Hellman algorithm is also use in Secure Shell (SSH) & Transport Layer Security (TLS).
o Only two parties involved in the DH key exchange and the key is never sent over the wire.
o Diffie-Hellman key group is a group of integers used for the Diffie-Hellman key exchange.
o Cisco Firewalls and Routers can use Diffie-Hellman (DH) groups 1, 2, 5, 14, 15, 19, and 20.
o Diffie-Hellman groups determine the strength of the key used in the key exchange process.
o Higher group numbers are more secure but require additional time to compute the key.
o Diffie-Hellman groups (DH) is used within IKE to establish session keys.
o 768-bit and 1024-bit D-H groups are supported in the Cisco routers and Firewall.
o The 1024-bit group is more secure because of the larger key size.
o In terms of VPN, it is used in the in IKE or Phase1 part of setting up the VPN tunnel.
o There are multiple, Diffie-Hellman Groups that can be configured in an IKEv2 policy.
o Both peers in VPN exchange must use same DH group, which is negotiated during Phase 1.
o There are multiple Diffie-Hellman Groups 1 to 30 assigned and 31-32767 Unassigned.
DH Group Number Group Description Recommendation
Diffie-Hellman group 1 768-bit Modulus Avoid
Diffie-Hellman group 2 1024-bit Modulus Avoid
Diffie-Hellman group 5 1536-bit Modulus Avoid
Diffie-Hellman group 14 2048-bit Modulus Acceptable
Diffie-Hellman group 15 3072-bit Modulus Acceptable
Diffie-Hellman group 19 256-bit Elliptic Curve Elliptic Curve Acceptable
Diffie-Hellman group 20 384-bit Elliptic Curve Elliptic Curve NGE
Diffie-Hellman group 21 521-bit Elliptic Curve Elliptic Curve NGE
Diffie-Hellman group 24 2048-bit Modulus Next Generation Encryption

7 | P a g e Created by Ahmad Ali E-Mail: [email protected] , Mobile: 056 430 3717


8 | P a g e Created by Ahmad Ali E-Mail: [email protected] , Mobile: 056 430 3717

You might also like