Module 10 - Ipsec: Ing. Rayner Durango E. Msig Mcse, MCT
Module 10 - Ipsec: Ing. Rayner Durango E. Msig Mcse, MCT
• Implementing IPSec
• Understanding IPSec Deployment Scenarios
• Monitoring IPSec
Lesson: Implementing IPSec
• What is IPSec?
• How the IPSec Protocol Secures Traffic
• What is Internet Key Exchange (IKE)?
• IPSec Protocols
• Authentication Methods Used with IPSec
• IPSec Security Policy
• IPSec Packet Filtering
• IPSec Security Policy (Group Policy)
What Is IPSec?
IPSec provides:
Mutual authentication before and
during communications
Confidentiality through encryption of IP traffic
Integrity of IP traffic by rejecting modified traffic
Protection from replay attacks
1 Active Directory
Internet Key
Exchange (IKE)
Negotiation
TCP Layer
2 TCP Layer
3
Encrypted IP Packets
Source: http://searchsecurity.techtarget.com/definition/Internet-Key-Exchange
What is Internet Key Exchange (IKE)?
IP payload
IP ESP ESP Auth
(TCP segment, UDP message, ICMP ESP trailer
header header trailer
message)
Authentication
Method Use
Clients running the Kerberos V5 protocol
Kerberos V5
that are members of the same or trusted
security protocol
domains
Internet access
Remote access to corporate resources
Public key
certificate External business partners
Computers that do not run the Kerberos
V5 security protocol
IP security policy
Rules
IPfilter
filterlists
lists Filter actions
IPIPfilter lists IPIPfilter
filterlists
lists
IP filters
DEN-SRV1
Client Server
Secure Server
No policy assigned (Respond (Request
(Require Security)
Only) Security)
No policy
No IPSec No IPSec No IPSec No communication
assigned
Client (Respond
No IPSec No IPSec IPSec IPSec
Only)
Server (Request
No IPSec IPSec IPSec IPSec
Security)
Secure Server
(Require No communication IPSec IPSec IPSec
Security)
• IPSec Modes
• Recommended Uses of IPSec
• IPSec Configurations for Virtual Private
Networking
IPSec Modes
Tunnel mode
Use tunnel mode to
secure traffic
Router Router
between two
networks
Transport mode
Use transport mode
to secure traffic
between any two
hosts
Router
VPN Server
Internet
Remote Client
• IP Security Monitor
• Guidelines for Monitoring IPSec Policies
IP Security Monitor
1 Stop the IPSec Policy Agent and use the ping command to
verify communications
2 Start the IPSec Policy Agent and use IP Security Monitor to
determine if a security association exists
3 Verify that the policies are assigned
4 Review the policies and ensure they are compatible
Use IP Security Monitor to ensure that any changes are
5 applied