Professional Documents
Culture Documents
Umber Saba (10-CP-32) Qurat-ul-Ain Ali (10-CP-31) Aysha (10-CP-71) Engr .Romana Farhan University of Engineering and Technology Taxila
Umber Saba (10-CP-32) Qurat-ul-Ain Ali (10-CP-31) Aysha (10-CP-71) Engr .Romana Farhan University of Engineering and Technology Taxila
Overview:
IP Security is used to transfer
data securely over unprotected
networks like Internet.
Services:
Connectionless integrity
Data origin authentication
Confidentiality (Encryption)
Access control
IPSecurity Protocols:
Authentication Header (AH)
Encapsulating Security
Payload (ESP)
Processing Types:
Outbound IP Processing.
Inbound IP Processing
Modes:
Tunnel Mode
Transport Mode
Benefits:
Operates at the network
layer
An Internet standard
Extensible hash and
encryption algorithms
Limitations:
Complex Configuration
Performance / Processing
Overhead
NAT incompatibilities