Download ipSecMicrosof

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Cryptanalysis wikipedia , lookup

Quantum key distribution wikipedia , lookup

Airport security wikipedia , lookup

Unix security wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Information security wikipedia , lookup

Secure multi-party computation wikipedia , lookup

Next-Generation Secure Computing Base wikipedia , lookup

Computer and network surveillance wikipedia , lookup

Post-quantum cryptography wikipedia , lookup

Wireless security wikipedia , lookup

Deep packet inspection wikipedia , lookup

Security and safety features new to Windows Vista wikipedia , lookup

Mobile security wikipedia , lookup

Computer security wikipedia , lookup

Security-focused operating system wikipedia , lookup

Authentication wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Cybercrime countermeasures wikipedia , lookup

Distributed firewall wikipedia , lookup

3-D Secure wikipedia , lookup

Transcript
Internet Protocol Security (IPSec)
Reviewing IPSec








Understanding Vulnerabilities
Threat Analysis
What Is IPSec?
Microsoft IPSec Features
Advantages and Disadvantages of IPSec
IPSec Security Services
Authentication Methods
How IPSec Is Deployed
Threat Analysis
1.
Identify threats
2.
Prioritize threats based on:
Probability of occurrence
Severity of potential damage
3.
Divide the number representing damage by the
number representing probability to determine the
threat level
4.
Address threats with the highest threat levels first
Example
Assume that you have identified two potential threats to your enterprise:
1. Threat A has been identified as having a high amount of damage
(Damage = 10) and a low probability of occurring (Probability = 10),
so the threat level is 1 (10/10 = 1).
2. Threat B has been identified as having a high amount of damage
(Damage = 8) and a fairly high probability of occurring (Probability = 3),
so the threat level is 2.67 (8/3 = 2.67).
Therefore, you would address Threat B first, because it has a higher
threat level.
What Is IPSec?
Can use security
protocols to encrypt or
digitally sign traffic
Can use tunnel mode
to secure traffic
between two networks
Can use transport
mode to secure traffic
between any two hosts
Tunnel Mode
Router
Router
Transport Mode
Router
Internet Protocol Security (IPSec) is a set of extensions to
the Internet Protocol (IP) family.

It provides cryptographic security services that allow for
authentication, integrity, access control, and confidentiality.

IPSec services are similar to Secure Sockets Layer (SSL), but at the
network layer, in a way that is completely transparent to your
applications and much more powerful. This is because your
applications do not need to have any knowledge of IPSec to be able
to use it.

You can create encrypted tunnels, (virtual private networks [VPNs]),
or simply perform encryption between computers.

The many options offered by IPSec make it much more complex
than SSL.
Microsoft IPSec Features
Implementation
Policy-based configuration
management
IPSec functionality over NAT
Description
Makes configuration, implementation, and
administration easier
Automatically detects the presence of a NAT
device and uses UDP-ESP encapsulation to
allow IPSec traffic to pass through the NAT
IPSec certificate-to-account
mapping
Allows you to set restrictions on which
computers are allowed to connect
Default traffic exemptions
Exempts only Internet Key Exchange (IKE)
traffic from IPSec filtering
Command-line management
Scripts and automates IPSec configuration
Computer startup security
Permits only the following traffic during
computer startup
Persistent policy for
enhanced security
Is applied before the local policy or the Active
Directory–based policy
IPSec is based on an end-to-end security model that establishes trust and
security from a source IP to a destination IP address. Any computers that
only route data from source to destination are not required to support IPSec,
unless firewall-type packet filtering or network address translation (NAT) is
in place.




This model allows for the successful deployment of IPSec in the following
enterprise scenarios:
Local area network (LAN): client/server and peer-to-peer
Wide area network (WAN): router-to-router and gateway-to-gateway using
IPSec tunnels
Remote access: dial-up clients and Internet access from private networks
IPSec tunnel mode
 When you use IPSec tunnel mode, IPSec encrypts the IP header and the
payload. Tunnel mode provides the protection of an entire IP packet.
IPSec transport mode
 Transport mode is the default mode IPSec encrypts only the IP payload.
Advantages and Disadvantages of IPSec
Advantages
Flexible security protocols
Transparent to users and
applications
Authentication
Confidentiality
Open industry (IETF)
standards
Data integrity
Dynamic rekeying
Secure end-to-end links
Easy implementation and
centralized management by
using policies
Disadvantages
Administrative overhead
Increased performance
requirement
Supportability
Policy management
Local policy configuration
IPSec Security Services
Feature
Description
Automatic key management
IKE services dynamically exchange and
manage keys between communicating
computers
Automatic security
negotiation
IKE services dynamically negotiate a
common set of security settings using IKE
services
Public key infrastructure
support
IPSec supports the use of public key
certificates for authentication
Preshared key support
IPSec can use a preshared key for
authentication
Authentication Methods

Kerberos V5
The default authentication method for IPSec

Public key certificates
Using this authentication method, security credentials can be
presented without being compromised in the process

Preshared key authentication
Both parties agree on a shared, secret key that is used for
authentication in an IPSec policy
How IPSec Is Deployed
Using policy-based management
Easy management
Easy implementation
Eliminates administrative overhead
Using local policies
One local policy
Group Policy settings can be stored on individual
computers
Policy-based configuration management

You can assign IPSec policies through Group Policy configuration of Active
Directory domains and organizational units.

This allows the IPSec policy to be assigned at the site, domain, or
organizational unit level, eliminating the administrative overhead of
configuring each computer separately.

IPSec Encapsulating Security Payload (ESP) packets can now pass
through a NAT device that allows UDP traffic. The Internet Key Exchange
(IKE) protocol automatically detects the presence of a NAT device and uses
UDP.

ESP encapsulation to allow IPSec traffic to pass through the NAT device.
Refs:
www.microsoft.com
www.wikipedia.com