Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Site-to-Site IPsec
VPNs with the IOS CLI
V 1.0
Learning Objectives
1.Configure EIGRP on the routers
2.Understand the main terms used in IPSec Tunnel
3.Understand Phase I & Phase II in the Operation of an IPSec
Tunnel
4.Create a site-to-site IPsec VPN using IOS
5.See the encryption of IP traffic in data communication
ACRONYMOUS
IPSec: Internet Protocol Security
VPN: Virtual Private Network
IKE: Internet Key Exchange
SA: Security Association
ISAKMP: Internet Security Association and Key
Management Protocol
DES: Data Encryption Standard
3DES: Triple Data Encryption Standard
AES: Advanced Encryption Standard
SEAL: Software - Optimized Encryption Algorithm
RC4: Rivest Ciphers 4
RSA: Rivest, Shamir, and Adleman
DH: Diffie-Hellman
DSA: Digital Signature Algorithm
ECC: Elliptic Curve Cryptography
SHA-1: Secure Hash Algorithm - 1
MD-5: Message Digest 5
ESP: Encapsulating Security Payload
AH: Authentication Header
HMAC: Hash-based Message Authentication Code
Notas:
-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------3
------
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------6
--------------------------------------
Encryption Overview
In cryptography, encryption is the process of encoding
messages or information in such a way that only
authorized parties can read it.
Notas:
-------------------------------------------------------------------------------------
DES
3DES
AES
SEAL
Rivest Cipher
RSA
DH
DSA
ECC
ElGamal
------------------------------------------------------------------------------------7
--------------------------------------
Hashing Overview
A hash function is a mathematical program that can be
used to map data of arbitrary size to data of fixed size.
The values returned by a hash function are called hash
values, hash codes, hash sums, or simply hashes. One
use is a data structure called a hash table, widely used
in computer software for rapid data lookup.
In this lab we will talk about the mathematical
computations used to create the hashing algorithms.
The two specific hashing algorithms we will discuss are
Message Digest 5 (MD5) and Secure Hash Algorithm
(SHA - 1).
Notas:
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------9
--------------------------------------
Notas:
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------10
-------------------------------
Authentication Header
Notas:
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------11
-------------------------------
-------------------------------
13
-------------------------------
AUTHENTICATION HEADER
& ESP
Notas:
------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------15
-------------------------------
AUTHENTICATION HEADER
FORMAT
Notas:
--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
------------------------------http://slideplayer.com/slide/3082688/ -----16