ipsec (ip security) tahir hussain tanmay shah. outline introduction ipsec protocols scenarios...

26
IPSec (IP Security) Tahir Hussain Tanmay Shah

Upload: lora-barnett

Post on 20-Jan-2016

223 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion

IPSec (IP Security)

Tahir Hussain

Tanmay Shah

Page 2: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion

outline

introduction

IPSec protocols

scenarios

conclusion

Page 3: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion

introduction

designed by IETF

“general” security

applications remain unchanged

optional for IPv4, mandatory for IPv6

Page 4: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion

IPSec protocols

AH – Authentication Header

ESP – Encapsulating Security Payload

Page 5: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion

ESP

Page 6: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion

scenario#1

many-to-one gate-way tunnel

Page 7: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion
Page 8: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion

ESP tunnel

Page 9: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion
Page 10: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion
Page 11: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion
Page 12: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion
Page 13: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion

CBR_Client packet sent vs. IPSec_in packet processed(30 packets sent & 30 packets processed)

Page 14: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion

Bytes Overhead(540 bytes overhead/gate way)

Page 15: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion

average end-to-end delay (s)0.275 s for node 8

Page 16: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion

Scenario#2

one-to-many gate-ways tunnels

Page 17: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion
Page 18: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion
Page 19: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion

packet loss (0)

Page 20: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion

overhead(1610 bytes/ security gate way 2)

Page 21: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion

average end-to-end delayo.275 for node 6,7 &8

Page 22: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion

Scenario#3nested tunnel

Page 23: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion

nested tunnel

Page 24: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion

Overhead node 3-6 – tunnel one & node 4-5 – tunnel two

Page 25: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion

conclusion

tunnel increases the packet overhead

high throughput – high security

delay distributes per tunnel

Page 26: IPSec (IP Security) Tahir Hussain Tanmay Shah. outline introduction IPSec protocols scenarios conclusion

References

http://www.scalable-networks.com/publications/documentation/model_specs.php

Qualnet model library

agenium_QualNet_Libraries_web.pdf