U5.10 Authentication Header

Descripción

Masters Degree Network Security Mapa Mental sobre U5.10 Authentication Header, creado por Craig Parker el 02/02/2014.
Craig Parker
Mapa Mental por Craig Parker, actualizado hace más de 1 año
Craig Parker
Creado por Craig Parker hace casi 11 años
21
0

Resumen del Recurso

U5.10 Authentication Header
  1. Implemented in transport or tunnel mode
    1. In transport mode
      1. AH is placed between TCP and IP headers
        1. in this mode the comms endpoint and the IPSEC endpoint must coincide, only 1 header is used
          1. MAC cover the application data, TCP header and most of the IP header
      2. Tunnel Mode
        1. Comms endpoint and IPSEC endpoint do not coincide
          1. An additional IP header is added and separated from the original IP header by the AH header
            1. Outer IP header contains the source and dest for the IPSEC end points
              1. Inner IP header contains the potentially different source and destination addresses of the comms endpoints
      3. Vital to authenticate the Source IP address so that recipient is certain the comms received is genuine and forging of packets is prevented
        1. AH authenticates source IP address
          1. This prevents the initiator from covering their tracks
        2. Using AH all of the payload is authenticated and most of the header
          1. components not authenticated are those modified on route
          2. Protocol Steps
            1. An authentication header is inserted into a datagram
              1. Header contains a Security Parameters Index (SPI) to help locate the Security Association (SA) with with the packet is processed
                1. Contains a sequence number to combat replay
                  1. And a MAC to provide authentication protection
                  2. SPI & SA provide a link to the encryption keys used to secure the comms

              Recursos multimedia adjuntos

              Mostrar resumen completo Ocultar resumen completo

              Similar

              CCNA Security 210-260 IINS - Exam 1
              Mike M
              CCNA Security 210-260 IINS - Exam 2
              Mike M
              SY0-401 Part 1 (50 questions)
              desideri
              CCNA Security 210-260 IINS - Exam 1
              Ricardo Nuñez
              CCNA Security 210-260 IINS - Exam 3
              irvin pastora
              1.3 Network and Security Components
              DJ Perrone
              U1. OSI 7 Layer Reference Model
              Craig Parker
              Types of Attacks
              River L.
              CCNA Security 210-260 IINS - Exam 1
              irvin pastora
              Network Security Vocabulary
              Shantal K Green
              Maximizing Efficiency: A Comprehensive Guide to Cloud Services for Your Business
              Andrew James