null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
521609
U5.11 Encapsulating Security Payload protocol
Description
Masters Degree Network Security Mind Map on U5.11 Encapsulating Security Payload protocol, created by Craig Parker on 02/02/2014.
No tags specified
network security
network security
masters degree
Mind Map by
Craig Parker
, updated more than 1 year ago
More
Less
Created by
Craig Parker
almost 12 years ago
50
0
0
Resource summary
U5.11 Encapsulating Security Payload protocol
Provides for confidentiality and authentication of the payload only
Encryption can be offered either just for the payload or for the datagram as a whole
Protocol inserts a new ESP header after the IP header and a new ESP trailer after the data field.
This way the ESP header and trailer encapsulate the data they protect
Header contains the SPI and the sequence number
Tralier contains padding information
Followed by the ESP authentication field containing MAC
Transport mode
ESP header is placed between the IP and the TCP header
Comms end points and IPSEC endpoints coincide so 1 header is used
Encryption covers the the payload, including the ESP tralier, excluding the MAC
IP header cannot be encrypted
Tunnel Mode
Additional IP header is needed since communicating end points and IPSEC end points do not coincide
This is separated from the original IP header by the ESP header
In tunnel mode the entire original ip datagram including the IP header is encrypted
The new IP header contains the source and destination of the IPSEC gateways
Encryption covers all encapsulated data but excludes the MAC
If ESP is used only the payload is authnticatied
See pg 12 of notes for diagrams
Weaknesses if only ESP Auth is used
Only the payload is authenticated, not the IP address, leaving it open to packet forgery
See module for further diagram explinations
Media attachments
IP_datagram_AH_ESP.JPG (image/JPG)
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
CCNA Security 210-260 IINS - Exam 1
Mike M
CCNA Security 210-260 IINS - Exam 2
Mike M
SY0-401 Part 1 (50 questions)
desideri
CCNA Security 210-260 IINS - Exam 1
Ricardo Nuñez
CCNA Security 210-260 IINS - Exam 3
irvin pastora
1.3 Network and Security Components
DJ Perrone
U1. OSI 7 Layer Reference Model
Craig Parker
Types of Attacks
River L.
CCNA Security 210-260 IINS - Exam 1
irvin pastora
Network Security Vocabulary
Shantal K Green
Maximizing Efficiency: A Comprehensive Guide to Cloud Services for Your Business
Andrew James
Browse Library