28.06.2014 Views

Discussion

Discussion

Discussion

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter<br />

CHAPTER<br />

3<br />

3<br />

IPSec 3<br />

3.0 Introduction<br />

IP Security (IPSec) is a protocol suite developed in the late 1990s that provides security<br />

services for Layer 3 IP datagrams, which otherwise have no inherent security. It is<br />

defined in RFCs 2401 through 2412. IPSec is optional for IPv4 and mandatory for<br />

IPv6. Because it operates at Layer 3, IPSec provides security for higher-level traffic,<br />

including TCP and UDP.<br />

The IPSec suite defines the security protocols, the algorithms used to provide security,<br />

and the cryptographic keys required to provide the services.<br />

Traffic protection is provided by two security protocols, Authentication Header (AH)<br />

and Encapsulation Security Payload (ESP). AH provides connectionless integrity and<br />

data origin authentication for IP packets, authenticating the complete packet, including<br />

the IP header, except for IP header fields that change in transit. It also provides<br />

protection against replay attacks, a type of network attack in which valid data is<br />

maliciously transmitted repeatedly. ESP offers encryption to provide data confidentiality,<br />

and it authenticates the packet payload and the ESP header itself, but not the<br />

outer IP header. In the JUNOS software, you can configure either AH or ESP, or a<br />

combination of the two.<br />

IPSec authentication algorithms use a shared key to verify the identity of the sending<br />

IPSec device. The protocol suite defines two algorithms, MD5 and SHA1. MD5 uses<br />

a one-way hash function to convert messages to a 128-bit digest. The calculated<br />

digest is compared with one that has been decrypted with a shared key, and if the<br />

two match, the IPSec device is authenticated. SHA1 is a stronger algorithm, producing<br />

a 160-bit digest. The JUNOS software implements the HMAC version of both<br />

these algorithms, and they are available for the AH and ESP protocols and for the<br />

Internet Key Exchange (IKE) protocol, which establishes and maintains SAs and<br />

exchanges the authentication and encryption keys between IPSec devices.<br />

106<br />

This is the Title of the Book, eMatter Edition<br />

Copyright © 2008 O’Reilly & Associates, Inc. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!