IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios...

26
IPSec (IP Security) Tahir Hussain Tanmay Shah

Transcript of IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios...

Page 1: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion.

IPSec (IP Security)

Tahir Hussain

Tanmay Shah

Page 2: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion.

outline

introduction

IPSec protocols

scenarios

conclusion

Page 3: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion.

introduction

designed by IETF

“general” security

applications remain unchanged

optional for IPv4, mandatory for IPv6

Page 4: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion.

IPSec protocols

AH – Authentication Header

ESP – Encapsulating Security Payload

Page 5: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion.

ESP

Page 6: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion.

scenario#1

many-to-one gate-way tunnel

Page 7: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion.
Page 8: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion.

ESP tunnel

Page 9: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion.
Page 10: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion.
Page 11: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion.
Page 12: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion.
Page 13: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion.

CBR_Client packet sent vs. IPSec_in packet processed(30 packets sent & 30 packets processed)

Page 14: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion.

Bytes Overhead(540 bytes overhead/gate way)

Page 15: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion.

average end-to-end delay (s)0.275 s for node 8

Page 16: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion.

Scenario#2

one-to-many gate-ways tunnels

Page 17: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion.
Page 18: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion.
Page 19: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion.

packet loss (0)

Page 20: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion.

overhead(1610 bytes/ security gate way 2)

Page 21: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion.

average end-to-end delayo.275 for node 6,7 &8

Page 22: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion.

Scenario#3nested tunnel

Page 23: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion.

nested tunnel

Page 24: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion.

Overhead node 3-6 – tunnel one & node 4-5 – tunnel two

Page 25: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion.

conclusion

tunnel increases the packet overhead

high throughput – high security

delay distributes per tunnel

Page 26: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion.

References

http://www.scalable-networks.com/publications/documentation/model_specs.php

Qualnet model library

agenium_QualNet_Libraries_web.pdf