null
US
Iniciar Sesión
Regístrate Gratis
Registro
Hemos detectado que no tienes habilitado Javascript en tu navegador. La naturaleza dinámica de nuestro sitio requiere que Javascript esté habilitado para un funcionamiento adecuado. Por favor lee nuestros
términos y condiciones
para más información.
Siguiente
Copiar y Editar
¡Debes iniciar sesión para completar esta acción!
Regístrate gratis
521575
U5.10 Authentication Header
Descripción
Masters Degree Network Security Mapa Mental sobre U5.10 Authentication Header, creado por Craig Parker el 02/02/2014.
Sin etiquetas
network security
network security
masters degree
Mapa Mental por
Craig Parker
, actualizado hace más de 1 año
Más
Menos
Creado por
Craig Parker
hace casi 11 años
21
0
0
Resumen del Recurso
U5.10 Authentication Header
Implemented in transport or tunnel mode
In transport mode
AH is placed between TCP and IP headers
in this mode the comms endpoint and the IPSEC endpoint must coincide, only 1 header is used
MAC cover the application data, TCP header and most of the IP header
Tunnel Mode
Comms endpoint and IPSEC endpoint do not coincide
An additional IP header is added and separated from the original IP header by the AH header
Outer IP header contains the source and dest for the IPSEC end points
Inner IP header contains the potentially different source and destination addresses of the comms endpoints
Vital to authenticate the Source IP address so that recipient is certain the comms received is genuine and forging of packets is prevented
AH authenticates source IP address
This prevents the initiator from covering their tracks
Using AH all of the payload is authenticated and most of the header
components not authenticated are those modified on route
Protocol Steps
An authentication header is inserted into a datagram
Header contains a Security Parameters Index (SPI) to help locate the Security Association (SA) with with the packet is processed
Contains a sequence number to combat replay
And a MAC to provide authentication protection
SPI & SA provide a link to the encryption keys used to secure the comms
Recursos multimedia adjuntos
IP_datagram_AH.JPG (image/JPG)
Mostrar resumen completo
Ocultar resumen completo
¿Quieres crear tus propios
Mapas Mentales
gratis
con GoConqr?
Más información
.
Similar
CCNA Security 210-260 IINS - Exam 1
Mike M
CCNA Security 210-260 IINS - Exam 2
Mike M
SY0-401 Part 1 (50 questions)
desideri
CCNA Security 210-260 IINS - Exam 1
Ricardo Nuñez
CCNA Security 210-260 IINS - Exam 3
irvin pastora
1.3 Network and Security Components
DJ Perrone
U1. OSI 7 Layer Reference Model
Craig Parker
Types of Attacks
River L.
CCNA Security 210-260 IINS - Exam 1
irvin pastora
Network Security Vocabulary
Shantal K Green
Maximizing Efficiency: A Comprehensive Guide to Cloud Services for Your Business
Andrew James
Explorar la Librería