null
US
Sign In
Sign Up for Free
Sign Up
We have detected that Javascript is not enabled in your browser. The dynamic nature of our site means that Javascript must be enabled to function properly. Please read our
terms and conditions
for more information.
Next up
Copy and Edit
You need to log in to complete this action!
Register for Free
521575
U5.10 Authentication Header
Description
Masters Degree Network Security Mind Map on U5.10 Authentication Header, created by Craig Parker on 02/02/2014.
No tags specified
network security
network security
masters degree
Mind Map by
Craig Parker
, updated more than 1 year ago
More
Less
Created by
Craig Parker
almost 11 years ago
21
0
0
Resource summary
U5.10 Authentication Header
Implemented in transport or tunnel mode
In transport mode
AH is placed between TCP and IP headers
in this mode the comms endpoint and the IPSEC endpoint must coincide, only 1 header is used
MAC cover the application data, TCP header and most of the IP header
Tunnel Mode
Comms endpoint and IPSEC endpoint do not coincide
An additional IP header is added and separated from the original IP header by the AH header
Outer IP header contains the source and dest for the IPSEC end points
Inner IP header contains the potentially different source and destination addresses of the comms endpoints
Vital to authenticate the Source IP address so that recipient is certain the comms received is genuine and forging of packets is prevented
AH authenticates source IP address
This prevents the initiator from covering their tracks
Using AH all of the payload is authenticated and most of the header
components not authenticated are those modified on route
Protocol Steps
An authentication header is inserted into a datagram
Header contains a Security Parameters Index (SPI) to help locate the Security Association (SA) with with the packet is processed
Contains a sequence number to combat replay
And a MAC to provide authentication protection
SPI & SA provide a link to the encryption keys used to secure the comms
Media attachments
IP_datagram_AH.JPG (image/JPG)
Show full summary
Hide full summary
Want to create your own
Mind Maps
for
free
with GoConqr?
Learn more
.
Similar
CCNA Security 210-260 IINS - Exam 1
Mike M
CCNA Security 210-260 IINS - Exam 2
Mike M
SY0-401 Part 1 (50 questions)
desideri
CCNA Security 210-260 IINS - Exam 1
Ricardo Nuñez
CCNA Security 210-260 IINS - Exam 3
irvin pastora
1.3 Network and Security Components
DJ Perrone
U1. OSI 7 Layer Reference Model
Craig Parker
Types of Attacks
River L.
CCNA Security 210-260 IINS - Exam 1
irvin pastora
Network Security Vocabulary
Shantal K Green
Maximizing Efficiency: A Comprehensive Guide to Cloud Services for Your Business
Andrew James
Browse Library