Module 9: Securing network traffic by using IPSec. This module provides you with the knowledge and skills to secure network traffic and to use certificates with IPSec for increased security. After completing this module, students will be able to: Implement IPSec, understand IPSec deployment scenarios, monitor IPSec. | Module 9: Securing Network Traffic by Using IPSec Overview Implementing IPSec Understanding IPSec Deployment Scenarios Monitoring IPSec Lesson: Implementing IPSec Multimedia: The Role of IPSec in a Network Infrastructure What Is IPSec? How IPSec Works IPSec Protocols IPSec Security Policy How IPSec Policies Work Together Certificates and IPSec Multimedia: Certificate Enrollment Practice: Implementing IPSec Multimedia: The Role of IPSec in a Network Infrastructure The objective of this presentation is to describe how IPSec is used to ensure secure private communications over IP networks At the end of this presentation, you will be able to: Explain what IPSec is Describe how IPSec works Describe how IPSec policies work What Is IPSec? IPSec provides: IPSec verifies, authenticates, and encrypts IP packets to provide secure network transmissions Mutual authentication before and during communications Confidentiality through encryption of IP traffic Integrity of IP traffic by rejecting modified traffic Protection from replay attacks How IPSec Works TCP Layer IPSec Driver TCP Layer IPSec Driver Encrypted IP Packets 3 Security Association Negotiation (ISAKMP) 2 IPSec Policy IPSec Policy 1 Active Directory IPSec Protocols AH provides authentication, integrity, and anti-replay protection ESP provides confidentiality, authentication, integrity, and anti-replay protection IP header Authentication header IP payload (TCP segment, UDP message, ICMP message) Signed by Authentication header Signed by ESP Auth trailer IP header ESP header IP payload (TCP segment, UDP message, ICMP message) ESP trailer ESP Auth trailer Encrypted with ESP header IPSec Security Policy IPSec uses rules and policies to secure network traffic Rules are composed of: A filter A filter action An authentication method Default policies include: Client (Respond Only) Server (Request Security) Secure Server (Require Security) Demonstration: Configuring an IPSec Policy Your instructor | Module 9: Securing Network Traffic by Using IPSec Overview Implementing IPSec Understanding IPSec Deployment Scenarios Monitoring IPSec Lesson: Implementing IPSec Multimedia: The Role of IPSec in a Network Infrastructure What Is IPSec? How IPSec Works IPSec Protocols IPSec Security Policy How IPSec Policies Work Together Certificates and IPSec Multimedia: Certificate Enrollment Practice: Implementing IPSec Multimedia: The Role of IPSec in a Network Infrastructure The objective of this presentation is to describe how IPSec is used to ensure secure private communications over IP networks At the end of this presentation, you will be able to: Explain what IPSec is Describe how IPSec works Describe how IPSec policies work What Is IPSec? IPSec provides: IPSec verifies, authenticates, and encrypts IP packets to provide secure network transmissions Mutual authentication before and during communications Confidentiality through encryption of IP traffic Integrity of IP traffic by