Professional Documents
Culture Documents
32.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Figure 32.1 Common structure of three security protocols
32.2
32-1 IPSecurity (IPSec)
32.3
Figure 32.2 TCP/IP protocol suite and IPSec
32.4
Figure 32.3 Transport mode and tunnel modes of IPSec protocol
32.5
Note
32.6
Figure 32.4 Transport mode in action
32.7
Figure 32.5 Tunnel mode in action
32.8
Note
32.9
Figure 32.6 Authentication Header (AH) Protocol in transport mode
32.10
Note
32.11
Figure 32.7 Encapsulating Security Payload (ESP) Protocol in transport mode
32.12
Note
32.13
Table 32.1 IPSec services
32.14
Figure 32.8 Simple inbound and outbound security associations
32.15
Note
32.16
Figure 32.9 IKE components
32.17
Table 32.2 Addresses for private networks
32.18
Figure 32.10 Private network
32.19
Figure 32.11 Hybrid network
32.20
Figure 32.12 Virtual private network
32.21
Figure 32.13 Addressing in a VPN
32.22
32-2 SSL/TLS
32.23
Figure 32.14 Location of SSL and TLS in the Internet model
32.24
Table 32.3 SSL cipher suite list
32.25
Table 32.3 SSL cipher suite list (continued)
32.26
Note
32.27
Figure 32.15 Creation of cryptographic secrets in SSL
32.28
Figure 32.16 Four SSL protocols
32.29
Figure 32.17 Handshake Protocol
32.30
Figure 32.18 Processing done by the Record Protocol
32.31
32-3 PGP
32.33
Note
32.34
Figure 32.20 A scenario in which an e-mail message is
authenticated and encrypted
32.35
Table 32.4 PGP Algorithms
32.36
Figure 32.21 Rings
32.37
Note
32.38
32-4 FIREWALLS
32.39
Figure 32.22 Firewall
32.40
Figure 32.23 Packet-filter firewall
32.41
Note
32.42
Figure 32.24 Proxy firewall
32.43
Note
32.44