U5.11 Encapsulating Security Payload protocol

Description

Masters Degree Network Security Mind Map on U5.11 Encapsulating Security Payload protocol, created by Craig Parker on 02/02/2014.
Craig Parker
Mind Map by Craig Parker, updated more than 1 year ago
Craig Parker
Created by Craig Parker over 11 years ago
45
0
1 2 3 4 5 (0)

Resource summary

U5.11 Encapsulating Security Payload protocol
  1. Provides for confidentiality and authentication of the payload only
    1. Encryption can be offered either just for the payload or for the datagram as a whole
      1. Protocol inserts a new ESP header after the IP header and a new ESP trailer after the data field.
        1. This way the ESP header and trailer encapsulate the data they protect
          1. Header contains the SPI and the sequence number
            1. Tralier contains padding information
              1. Followed by the ESP authentication field containing MAC
        2. Transport mode
          1. ESP header is placed between the IP and the TCP header
            1. Comms end points and IPSEC endpoints coincide so 1 header is used
              1. Encryption covers the the payload, including the ESP tralier, excluding the MAC
                1. IP header cannot be encrypted
                2. Tunnel Mode
                  1. Additional IP header is needed since communicating end points and IPSEC end points do not coincide
                    1. This is separated from the original IP header by the ESP header
                      1. In tunnel mode the entire original ip datagram including the IP header is encrypted
                        1. The new IP header contains the source and destination of the IPSEC gateways
                          1. Encryption covers all encapsulated data but excludes the MAC
                            1. If ESP is used only the payload is authnticatied
                  2. See pg 12 of notes for diagrams
                    1. Weaknesses if only ESP Auth is used
                      1. Only the payload is authenticated, not the IP address, leaving it open to packet forgery
                      2. See module for further diagram explinations
                      Show full summary Hide full summary

                      0 comments

                      There are no comments, be the first and leave one below:

                      Similar

                      CCNA Security 210-260 IINS - Exam 2
                      Mike M
                      SY0-401 Part 1 (50 questions)
                      desideri
                      CCNA Security 210-260 IINS - Exam 1
                      Ricardo Nuñez
                      CCNA Security 210-260 IINS - Exam 3
                      irvin pastora
                      1.3 Network and Security Components
                      DJ Perrone
                      U1. OSI 7 Layer Reference Model
                      Craig Parker
                      Types of Attacks
                      River L.
                      CCNA Security 210-260 IINS - Exam 1
                      irvin pastora
                      Network Security Vocabulary
                      Shantal K Green
                      Maximizing Efficiency: A Comprehensive Guide to Cloud Services for Your Business
                      Andrew James