Network Security (2)
Network Security (2)
1|Page
3. Third Generation - Application Layer ❖ Allows web browsing, FTP, email, ❖ Vulnerable to attacks like data
Firewall: and other services. tampering, identity spoofing, and
❖ Inspects and filters packets up to the ❖ Forwards client requests and retrieves privacy loss.
application layer. responses. • Solution: IPSec addresses these issues
❖ Recognizes and blocks misuse of with strong encryption, authentication,
specific applications and protocols Proxy Types and data integrity.
(e.g., HTTP, FTP). • Forward Proxy:
❖ Operates with proxy servers, ❖ Client requests the proxy to access 2. Security Issues in IP Networks
preventing direct connections between the internet. • Data Integrity Attack: Packets can be
internal and external networks. • Open Proxy: altered during transmission.
❖ Can also act as a Network Address ❖ Conceals a client's IP address while • Identity Spoofing: IP addresses can be
Translator (NAT). browsing. faked.
4. Next Generation Firewalls (NGFW): • Reverse Proxy: • Anti-Replay Attacks: Data can be
❖ Includes features like Deep Packet ❖ Forwards requests to proxy servers captured and resent without
Inspection, Application Inspection, and and presents the response as if it permission.
SSL/SSH inspection. came from the original server. • Loss of Privacy: Packet contents can be
❖ Provides advanced protection from read in transit.
modern threats. Proxy Server Architecture • How IPSec Helps:
• User Interface: ❖ Ensures encryption, integrity,
Firewall Types ❖ Provides easy management, including authentication, and replay protection
• Packet Filter: starting/stopping the proxy, blocking for data security.
❖ Looks at packets entering or leaving URLs/clients, and managing
the network. logs/cache. 3. What is IPSec?
❖ Accepts or rejects based on rules. • Proxy Server Listener: • Definition: A set of protocols and
❖ Transparent to users but hard to ❖ Listens for client requests and algorithms that secure IP traffic at the
configure. handles client blocking. network layer.
❖ Vulnerable to IP spoofing. • Connection Manager: • Compatibility:
• Application Gateway/Proxy: ❖ Manages proxy connections. ❖ Built into IPv6 and supports IPv4.
❖ Handles TCP/IP application requests • Cache Manager: • Functions:
(e.g., FTP, TELNET). ❖ Manages web page storage, deletion, ❖ Works across different security layers
❖ Highly effective but can cause and retrieval from the cache. (e.g., TLS, HTTPS).
performance degradation. • Log Manager: ❖ Hardware encryption adds an extra
• Circuit Level Gateway: ❖ Manages logs, including viewing, layer of security for all applications.
❖ Standalone application that doesn’t clearing, and updating logs.
permit end-to-end TCP connections. • Configuration Module: 4. Core Functions of IPSec
❖ Sets up two TCP connections ❖ Configures proxy settings like 1. Authentication:
(internal and external hosts). caching. ❖ Ensures packets are from the
• Bastion Host: intended sender.
❖ A dedicated machine designed to Tunneling - Proxy ❖ Verifies packets haven’t been altered
withstand attacks. • Purpose: in transit.
❖ Hosts specific applications (e.g., ❖ Allows users to bypass firewall 2. Confidentiality:
Telnet, SMTP, FTP). restrictions by sending data through ❖ Encrypts messages to prevent
❖ Limits application support to reduce HTTP (port 80). eavesdropping.
security threats.
• SSL Tunneling: 3. Key Management:
❖ Web proxy servers use SSL tunneling ❖ Safely exchanges and manages
Port Forwarding protocols to securely transmit data encryption keys.
• Usage: through port 443. Applications:
❖ Allows internal devices to • Used in secure e-commerce, remote
communicate with the external Proxy Connection Settings access, LANs, WANs, and the Internet.
network via a single public IP
• Configuration Options:
address.
❖ Manual or automatic proxy 5. Benefits of IPSec
❖ Router/firewall must forward • Provides strong security for all traffic
configuration.
incoming connections to specific
❖ Specific ports for HTTP, SSL, FTP, crossing firewalls/routers.
private IP addresses and ports.
SOCKS. • Transparent to applications and end-users.
• Process: ❖ Options for exceptions (e.g., • Secures routing architecture and
❖ Network administrators configure localhost). individual users.
routers to accept and forward
connections.
6. IPSec Documents
Simplified Document: IP Security (IPSec) 1. Architecture:
Proxy Overview
❖ Describes security concepts and
• Definition: 1. Introduction to IPSec mechanisms (RFC 4301).
❖ A proxy acts as an intermediary for • IP Protocol Issue: Original IP design 2. Authentication Header (AH):
machines on the network to access (from the 1970s–80s) lacked security ❖ Ensures message authentication and
the internet. since all hosts and users were known integrity (RFC 4302).
❖ It forwards requests from clients to and trusted. 3. Encapsulating Security Payload
other servers or services.
• Modern Internet Challenges: (ESP):
• Proxy Functions: ❖ Untrusted public networks.
2|Page
❖ Provides encryption and ❖ Sequence Number Counter:
authentication (RFC 4303). Prevents duplicate packets.
4. Internet Key Exchange (IKE): ❖ Anti-Replay Window: Detects and
❖ Manages secure key exchanges. prevents replay attacks.
5. Cryptographic Algorithms: ❖ AH/ESP Information: Stores
❖ Defines encryption, authentication, algorithms, keys, and lifetimes.
and key exchange methods. ❖ Lifetime: Defines when an SA
6. Domain of Interpretation (DOI): expires.
❖ Specifies encryption/authentication ❖ IPSec Protocol Mode: Specifies
identifiers and operational transport or tunnel mode.
parameters. ❖ Path MTU: Tracks the maximum
packet size for transmission.
7. IPSec Architecture
• Modes of Operation: 11. Security Policy Database (SPD)
1. Transport Mode: • Purpose: Determines how IP traffic
End-to-end security between relates to specific SAs.
two hosts. • SA Selectors:
2. Tunnel Mode: ❖ Destination IP Address: Can specify
Security between gateways or a single address, a range, or a
between a host and a gateway wildcard.
(used in VPNs). ❖ Source IP Address: Same options as
• Key Components: destination.
Security Association (SA): One- ❖ User ID: Links traffic to a specific
way relationship providing security user (if supported).
for traffic. ❖ Data Sensitivity Level: Defines the
Security Parameter Index (SPI): security level (e.g., secret or public).
A unique identifier for each SA. ❖ Transport Protocol: Identifies the
Security Association Database protocol (e.g., TCP, UDP).
(SAD): Stores all parameters for ❖ Source/Destination Ports: Specifies
each SA. the application or service (e.g., port
Security Policy Database (SPD): 80 for HTTP).
Links IP traffic to specific SAs Actions:
based on rules. 1. Discard: Blocks traffic.
2. Bypass: Allows traffic without IPSec.
8. Transport Mode vs. Tunnel Mode 3. Protect: Applies IPSec security.
• Transport Mode:
Encrypts only the packet’s payload 12. Actions When SA is Missing
(inner data). • Outbound Traffic:
AH can protect headers and payloads. ❖ Use IKE to dynamically generate an
• Tunnel Mode: SA.
Encrypts the entire packet, including • Inbound Traffic:
headers. ❖ Drop the packet if no SA is available.
AH applies to parts of the outer
header.
3|Page