Transcript Chapter 9
Securing Data Transmission and Authentication
Securing Traffic with IPSec
IPSec allows us to protect our network from within
IPSec secures the IP protocol
IPSec has two principle goals:
To protect the contents of IP packets
To provide defense against network attacks through
packet filtering and the enforcement of trusted
communication.
Attacks that IPSec can prevent and reduce:
Packet Sniffing
Man in the Middle
Data Modification
Denial of Service
Identity Spoofing
Understanding IPSec
IPSec can be deployed in the following scenarios:
LAN – Client/Server and peer to peer LANs
WAN – Router to Router
Remote Access – Dial up clients and Internet access from
private networks
Both sides require a shared IPSec policy to establish the
security settings that will be used.
IPSec can be configured to use one of two modes:
Transport mode – Use this mode when you require packet
filtering and when you require end-to-end security.
Tunnel mode – Use tunnel mode for site-to-site
communications that cross the Internet. Gateway-toGateway protection
Understanding IPSec contd.
IPSec provides security using a combination of
individual protocols.
Authentication Header (AH) – protocol provides
authentication, integrity, and anti-replay for the packet.
This protocol does not encrypt, but protects from
modification.
Encapsulating Security Payload (ESP) – provides
confidentiality of the packet (encryption).
Understanding Security Associations
SA – is the combination of security services, protection
mechanisms, and keys agreed to by communicating
peers.
When traffic meets a filter that is defined in the policy,
the security parameters much then be negotiated. The
SA is what is agreed upon.
Internet Key Exchange (IKE) – an algorithm used to
generate the secret keys agreed upon in the SA.
IPSec Policies
Policies are the security rules that define the desired
security levels negotiated in the SA.
The policy also define which traffic is “interesting” and
whether or not to negotiate IPSec or just send the
information with out modification.
Components of a Policy:
Tunnel setting
Network Type
IP filter
IP protocol Port
IP filter list
Filter Action
Authentication method
Creating IPSec Policies
Go to local security Policy
Use “IP security policies” for policies that must be
compatible with versions of Windows older than
Vista/Server 2008
Use Windows Firewall with Advanced Security for
Vista/Server 2008 systems.
Breaking it all down
Example on board
Configuring Network Authentication
When a computer connects to a network it must be
authenticated. Typically this is done through Active
Directory and Kerberos.
However, if there is no AD domain or you have older
clients you may need to change the Authentication
type to NTLM.
Computer Configuration->Policies->Windows Setting> Security Settings->Security Options->Network
Security:NTLM