ipsec (ip security) tahir hussain tanmay shah. outline introduction ipsec protocols scenarios...
TRANSCRIPT
![Page 1: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion](https://reader036.vdocuments.us/reader036/viewer/2022081520/56649ef35503460f94c0602d/html5/thumbnails/1.jpg)
IPSec (IP Security)
Tahir Hussain
Tanmay Shah
![Page 2: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion](https://reader036.vdocuments.us/reader036/viewer/2022081520/56649ef35503460f94c0602d/html5/thumbnails/2.jpg)
outline
introduction
IPSec protocols
scenarios
conclusion
![Page 3: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion](https://reader036.vdocuments.us/reader036/viewer/2022081520/56649ef35503460f94c0602d/html5/thumbnails/3.jpg)
introduction
designed by IETF
“general” security
applications remain unchanged
optional for IPv4, mandatory for IPv6
![Page 4: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion](https://reader036.vdocuments.us/reader036/viewer/2022081520/56649ef35503460f94c0602d/html5/thumbnails/4.jpg)
IPSec protocols
AH – Authentication Header
ESP – Encapsulating Security Payload
![Page 5: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion](https://reader036.vdocuments.us/reader036/viewer/2022081520/56649ef35503460f94c0602d/html5/thumbnails/5.jpg)
ESP
![Page 6: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion](https://reader036.vdocuments.us/reader036/viewer/2022081520/56649ef35503460f94c0602d/html5/thumbnails/6.jpg)
scenario#1
many-to-one gate-way tunnel
![Page 7: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion](https://reader036.vdocuments.us/reader036/viewer/2022081520/56649ef35503460f94c0602d/html5/thumbnails/7.jpg)
![Page 8: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion](https://reader036.vdocuments.us/reader036/viewer/2022081520/56649ef35503460f94c0602d/html5/thumbnails/8.jpg)
ESP tunnel
![Page 9: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion](https://reader036.vdocuments.us/reader036/viewer/2022081520/56649ef35503460f94c0602d/html5/thumbnails/9.jpg)
![Page 10: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion](https://reader036.vdocuments.us/reader036/viewer/2022081520/56649ef35503460f94c0602d/html5/thumbnails/10.jpg)
![Page 11: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion](https://reader036.vdocuments.us/reader036/viewer/2022081520/56649ef35503460f94c0602d/html5/thumbnails/11.jpg)
![Page 12: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion](https://reader036.vdocuments.us/reader036/viewer/2022081520/56649ef35503460f94c0602d/html5/thumbnails/12.jpg)
![Page 13: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion](https://reader036.vdocuments.us/reader036/viewer/2022081520/56649ef35503460f94c0602d/html5/thumbnails/13.jpg)
CBR_Client packet sent vs. IPSec_in packet processed(30 packets sent & 30 packets processed)
![Page 14: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion](https://reader036.vdocuments.us/reader036/viewer/2022081520/56649ef35503460f94c0602d/html5/thumbnails/14.jpg)
Bytes Overhead(540 bytes overhead/gate way)
![Page 15: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion](https://reader036.vdocuments.us/reader036/viewer/2022081520/56649ef35503460f94c0602d/html5/thumbnails/15.jpg)
average end-to-end delay (s)0.275 s for node 8
![Page 16: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion](https://reader036.vdocuments.us/reader036/viewer/2022081520/56649ef35503460f94c0602d/html5/thumbnails/16.jpg)
Scenario#2
one-to-many gate-ways tunnels
![Page 17: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion](https://reader036.vdocuments.us/reader036/viewer/2022081520/56649ef35503460f94c0602d/html5/thumbnails/17.jpg)
![Page 18: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion](https://reader036.vdocuments.us/reader036/viewer/2022081520/56649ef35503460f94c0602d/html5/thumbnails/18.jpg)
![Page 19: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion](https://reader036.vdocuments.us/reader036/viewer/2022081520/56649ef35503460f94c0602d/html5/thumbnails/19.jpg)
packet loss (0)
![Page 20: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion](https://reader036.vdocuments.us/reader036/viewer/2022081520/56649ef35503460f94c0602d/html5/thumbnails/20.jpg)
overhead(1610 bytes/ security gate way 2)
![Page 21: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion](https://reader036.vdocuments.us/reader036/viewer/2022081520/56649ef35503460f94c0602d/html5/thumbnails/21.jpg)
average end-to-end delayo.275 for node 6,7 &8
![Page 22: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion](https://reader036.vdocuments.us/reader036/viewer/2022081520/56649ef35503460f94c0602d/html5/thumbnails/22.jpg)
Scenario#3nested tunnel
![Page 23: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion](https://reader036.vdocuments.us/reader036/viewer/2022081520/56649ef35503460f94c0602d/html5/thumbnails/23.jpg)
nested tunnel
![Page 24: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion](https://reader036.vdocuments.us/reader036/viewer/2022081520/56649ef35503460f94c0602d/html5/thumbnails/24.jpg)
Overhead node 3-6 – tunnel one & node 4-5 – tunnel two
![Page 25: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion](https://reader036.vdocuments.us/reader036/viewer/2022081520/56649ef35503460f94c0602d/html5/thumbnails/25.jpg)
conclusion
tunnel increases the packet overhead
high throughput – high security
delay distributes per tunnel
![Page 26: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion](https://reader036.vdocuments.us/reader036/viewer/2022081520/56649ef35503460f94c0602d/html5/thumbnails/26.jpg)
References
http://www.scalable-networks.com/publications/documentation/model_specs.php
Qualnet model library
agenium_QualNet_Libraries_web.pdf