Ans: Secure branch office connectivity
over the Internet: A company can build a secure virtual private network
over the Internet or over a public WAN. This enables a business to rely heavily
on the Internet and reduce its need for private networks, saving costs and
network management overhead. Secure remote access over the Internet: An
end user whose system is equipped with IP security protocols can make a local
call to an Internet service provider (ISP) and gain secure access to a company
network. This reduces the cost of toll charges for traveling employees and
telecommuters. Establishing extranet and intranet connectivity with
partners: IPSec can be used to secure communication with other
organizations, ensuring authentication and confidentiality and providing a key
exchange mechanism. Enhancing electronic commerce security: Even though
some Web and electronic commerce applications have built-in security protocols,
the use of IPSec enhances that security.
2.
What services are provided by IPsec?
Ans: Access control; connectionless
integrity; data origin authentication; rejection of replayed packets (a form of
partial sequence integrity); confidentiality (encryption); and limited traffic
flow confidentiality
3.
What parameters identify an SA and what
parameters characterize the nature of a
particular SA?
Ans: A security association is uniquely
identified by three parameters: Security Parameters Index (SPI): A bit
string assigned to this SA and having local significance only. The SPI is
carried in AH and ESP headers to enable the receiving system to select the SA
under which a received packet will be processed. IP Destination Address: Currently,
only unicast addresses are allowed; this is the address of the destination
endpoint of the SA, which may be an end user system or a network system such as
a firewall or router. Security Protocol Identifier: This indicates
whether the association is an AH or ESP security association.
A security
association is normally defined by the following parameters: Sequence Number
Counter: A 32-bit value used to generate the Sequence Number field in AH or
ESP headers. Sequence Counter Overflow: A flag indicating whether
overflow of the Sequence Number Counter should generate an auditable event and
prevent further transmission of packets on this SA (required for all
implementations). Anti-Replay Window: Used to determine whether an
inbound AH or ESP packet is a replay, (required for all implementations). AH
Information: Authentication algorithm, keys, key lifetimes, and related
parameters being used with AH (required for AH implementations). ESP
Information: Encryption and authentication algorithm, keys, initialization
values, key lifetimes, and related parameters being used with ESP (required for
ESP implementations). Lifetime of this Security Association: A time
interval or byte count after which an SA must be replaced with a new SA (and
new SPI) or terminated, plus an indication of which of these actions should
occur (required for all implementations). IPSec Protocol Mode: Tunnel,
transport, or wildcard (required for all implementations). Path MTU: Any
observed path maximum transmission unit (maximum size of a packet that can be
transmitted without fragmentation) and aging variables (required for all
implementations).
4.
What is the difference between transport mode
and tunnel mode?
Ans: Transport mode provides
protection primarily for upper-layer protocols. That is, transport mode
protection extends to the payload of an IP packet. Tunnel mode provides
protection to the entire IP packet.
5.
What is a replay attack?
Ans: A replay attack is one in which an
attacker obtains a copy of an authenticated packet and later transmits it to
the intended destination. The receipt of duplicate, authenticated IP packets
may disrupt service in some way or may have some other undesired consequence.
6.
Why does ESP include a padding field?
Ans:
If an encryption algorithm requires the
plaintext to be a multiple of some number of bytes (e.g., the multiple of a
single block for a block cipher), the Padding field is used to expand the
plaintext (consisting of the Payload Data, Padding, Pad Length, and Next Header
fields) to the required length.
The ESP format requires that the Pad Length
and Next Header fields be right aligned within a 32-bit word. Equivalently, the
ciphertext must be an integer multiple of 32 bits. The Padding field is used to
assure this alignment.
Additional padding may be added to provide
partial traffic flow confidentiality by concealing the actual length of the
payload.
7.
What are the basic approaches to bundling SAs?
Ans: Transport adjacency: Refers to
applying more than one security protocol to the same IP packet, without
invoking tunneling. This approach to combining AH and ESP allows for only one
level of combination; further nesting yields no added benefit since the
processing is performed at one IPSec instance: the (ultimate) destination. Iterated
tunneling: Refers to the application of multiple layers of security
protocols affected through IP tunneling. This approach allows for multiple
levels of nesting, since each tunnel can originate or terminate at a different
IPSec site along the path.
8.
What are the roles of the Oakley key
determination protocol and ISAKMP in IPsec?
Ans:
ISAKMP by itself does not dictate a specific key exchange algorithm; rather,
ISAKMP consists of a set of message types that enable the use of a variety of
key exchange algorithms. Oakley is the specific key exchange algorithm mandated
for use with the initial version of ISAKMP.
ReplyDeleteGood informationcustom software development
Hello everyone..
ReplyDeleteI'm selling fresh leads. Details in leads are:
Full name
SSN
DOB
Phone Numbers
Address
City
State
Zip
Residential Status
Account Number
DL number
Emails
All leads are genuine, fresh & generated by spaming, I Will provide you samples for checking if u want.
Dealing in almost all types of leads.
SSN Leads
Dead Fullz
Premium Leads
Mortgage Leads
Bank Account Leads
Employee Leads
Business Leads
Home Owners Leads
DL Leads
Emails Leads
Phone Numbers Leads
Each lead will b cost $1.
Also cvv Fullz available track 1 & track 2 with pin.
Interested person contact, scammers stay away, sampling is free of cost.
email > leads.sellers1212@gmail.com
Whatsapp > +923172721122
Telegram > @leadsupplier
ICQ > 752822040
We are here to provide a top spa listing in Dubai. we also provide massage therapy services in al barsha, naif, deira, al mankhool, al wasl, al muraqqabat Massage Center in Al Muraqqabat
ReplyDelete