Results 1 to 6 of 6

Thread: What are the description of sub protocols

  1. #1
    Join Date
    Nov 2009
    Posts
    45

    What are the description of sub protocols

    What are the description of sub protocols and what are the security needs for the same. What authentication is needed to do in that. What are the different security policies are used in this protocols. The common one is tcp and thus what are the same modes of different types of security authentical used under this. my main concern relies with the sub protocols.

  2. #2
    Join Date
    Apr 2008
    Posts
    3,424

    Re: What are the description of sub protocols

    The tunnels for data exchange are based on 2 different protocols depending on the security needs of users. The first is the AH protocol (Authentication Header, RFC 2402) which aims to establish the identity of the end for sure. It does not guarantee any confidentiality (encryption) of data. The second protocol is the protocol ESP (Encapsulating Security Payload, RFC 2406) which is designed to encrypt data, with or without the packet headers if you want the tunneling mode. It also guarantees the authenticity of data and at this level may introduce redundancy compared to AH.

  3. #3
    Join Date
    May 2008
    Posts
    3,516

    Re: What are the description of sub protocols

    The Description of modes of IPSec are as follow the Transport mode does not change the original header and it sits between the network protocol (IP) and transport protocol (TCP, UDP). Several variants exist, according to the protocols described, the tunnel mode replaces the headers and original IP encapsulates the entire IP packet. For example, the external IP address to be that of the security gateway implementing IPSec, and the internal IP address B will be that of the final machine on the network behind the gateway.

  4. #4
    Join Date
    Apr 2008
    Posts
    3,339

    Re: What are the description of sub protocols

    A other mode is nesting mode. Nesting mode is hybrid since it uses the 2 methods mentioned like above. It is indeed encapsulate the IPSec to IPSec and we shall see later, the impact level implementation (bundle of SAs). An SA is a component (a physical point of view, a record in a database, SAD), which contains all information in sequence required to describe and exchange data to protect. Thus, each SA contains elements to determine what type of traffic or package it applies.

  5. #5
    Join Date
    Jan 2006
    Posts
    4,221

    Re: What are the description of sub protocols

    In sa the addresses of source and destination, the either unicast, anycast (IPv6), broadcast (IPv4) or Multicast, whether addressing a variety or a mask. A name in standard form (X500 or DNS) that permits among others to have SAs dedicated to users / hosts. The transport protocol (UDP / TCP mainly) The source and destination ports, thereby limiting the SA to a certain type of traffic or at a meeting. All these elements are called selectors and identify which SA applies to a particular traffic.

  6. #6
    Join Date
    Jan 2006
    Posts
    3,792

    Re: What are the description of sub protocols

    On the other hand, the primary function of SA is to indicate which treatments should be applied to traffic identified previously. You can distinguish the Data and authentication settings, for AH or ESP algorithms, keys. Data and privacy settings, for AH or ESP algorithms, keys, initialization vectors (IV). Data and parameters of anti-replay with sequence numbers, various counters, windows anti-replay.

Similar Threads

  1. Replies: 7
    Last Post: 18-10-2011, 01:05 AM
  2. What Protocols are Supported by PHP?
    By Vandam in forum Software Development
    Replies: 5
    Last Post: 28-02-2010, 04:51 AM
  3. What are various types of the protocols?
    By Julli_gaada in forum Networking & Security
    Replies: 4
    Last Post: 30-11-2009, 12:57 PM
  4. UDP and TCP protocols
    By Xmen in forum Networking & Security
    Replies: 3
    Last Post: 06-10-2009, 12:51 PM
  5. URL protocols
    By Ximen in forum Networking & Security
    Replies: 1
    Last Post: 05-01-2009, 07:30 PM

Tags for this Thread

Bookmarks

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •  
Page generated in 1,711,637,983.44587 seconds with 17 queries