Secure Networking 101 MACsec, IPsec, and SSL Basics
Secure Networking 101 MACsec, IPsec, and SSL Basics
NETWORKI NG
101
MACs ec, IPsec, and
SSL Basi cs
2
I NTRODUCTION
MACSec, IPsec, and SSL/TLS protocols have similar concepts and consist of two
“planes” :
• The “control plane” which is a management layer used for the management of
the secure protocol itself (authentication of the parties, key establishment and
rotation, etc.)
• The “data plane that protects the upper protocol data which conveys the useful
information (payload) in a secured way.
All these protocols provide secure services – in the scope of their layer:
• Mutual authentication (optional). Each party securely identifies the other party
(peer).
a. The credentials used for authentication are quite flexible, it can be
pre-shared keys, password, or PKI-based, etc.
• Integrity. All information that is sent on one side is guaranteed to be delivered
unmodified at the other side.
• Confidentiality (optional). All payloads are encrypted so that a 3rd party with
access to the network would not able to understand it.
• Anti-replay. Prevents interception and modification of payload between the
3
MACSEC
MACsec is a “link layer” protocol which works on a local network scale –point to point.
It protects the link between network equipment, e.g. between a laptop and a switch,
or between two switches. The control plane is IEEE 802.1X that is also commonly used
for WiFi networks. This protocol allows the control of access to the network: only
authenticated peers are able to get connectivity.
The data plane is IEEE 802.1AE and is a simple protocol based on Ethernet with AES-
GCM encryption of the packets.
• When MACsec is in use, only authenticated peers are able to connect to the
network.
• All local attacks that “trick” switches and routers to redirect network traffic to
attacker machines do not work if MACsec is enabled.
• MACsec is the wired equivalent of WPA2 in WiFi networks.
• MACsec is invisible to the application. It encrypts all traffic without the end point
application being aware.
A typical use case for MacSec would be to secure the connection between an IP
phone in a user’s office to the corporate phone server onsite.
4
IPSEC
IPsec is a “network layer” protocol, it works between any two peers participating in
an IP network such as the Internet, regardless of how those peers are connected (via
many routers, different types of links, etc).
• The control plane is IKE or IKEv2 (Internet Key Exchange).
• The data plane is IPsec.
• This protocol is typically used for VPN, (peer to network, or network to network)
• It is a very complex protocol with tons of variants and options.
• IPsec is invisible to the application. It encrypts all traffic without the end point
application being aware.
A typical use case for IPsec is a VPN client on a mobile device connecting to a VPN
server in the enterprise to allow employees are away from the office to connect
to company resources securely and to authenticate that the users are allowed to
connect.
Another use case would be to connect a remote office to a common company intranet.
SSL, TLS, and DTLS are “transport layer” protocols. They work between two endpoints
(in general it means one application running on one host). They provide security
directly to the endpoint.
TLS (Transport Layer Security) is the replacement for SSL (Secure Sockets Layer),
previous versions of SSL are deprecated and potentially have security issues. TLS
requires a reliable transport protocol and typically runs over TCP.
DTLS (Datagram Transport Layer Security) is based on TLS and adapted to run over
5
Inside’s SW implementation is efficient for the data plane but can also integrate with
accelerated hardware for high performance. Inside’s Quicksec IPsec is the clear market
leader supporting a large variation of networking hardware. The software control plane
can also use various HW modules for enhanced authentication including SSL.
Inside Secure’s MatrixSSL implements the SSL/TLS protocol and has been integrated
with our HWIP.
MatrixSSL has a generic PKCS #11 interface which can be used to integrate with
common hardware implementations.
Inside Secure’s SafeZone FIPS library is a FIPS certified cryptography library available
for use with IPsec, SSL, or for standalone secure applications.
http://www.insidesecure.com
Inside Silicon IP :
http://www.insidesecure.com/Markets-solutions/Enterprise-Security-and-Secure-
Access/Enterprise-Security-Solutions-for-SoC
NETWORK LAYERS
Inside Secure offers hardware IP and software stacks implementing high performance
SSL, TLS, DTLS, IPsec, and MACsec.
9
10