20.01.2014 Views

Lectures notes for 2010 - KTH

Lectures notes for 2010 - KTH

Lectures notes for 2010 - KTH

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Module 12: IPSec, VPNs, Firewalls, and NAT........................................ 1<br />

Outline.............................................................................................................................................. 2<br />

Private networks............................................................................................................................... 3<br />

Virtual Private networks (VPNs) .................................................................................................... 4<br />

Security Protocols, APIs, etc. .......................................................................................................... 5<br />

GSS-API .......................................................................................................................................... 6<br />

IPSec ................................................................................................................................................ 7<br />

ESP packet ....................................................................................................................................... 8<br />

AH header ........................................................................................................................................ 9<br />

ISAKMP ........................................................................................................................................ 10<br />

Where can you run IPSec? ............................................................................................................ 11<br />

Firewalls......................................................................................................................................... 12<br />

Linux firewall................................................................................................................................. 13<br />

Firewall Design.............................................................................................................................. 14<br />

Proxy Access Through A Firewall................................................................................................. 15<br />

SOCKs ........................................................................................................................................... 16<br />

Newping......................................................................................................................................... 17<br />

MBONE through firewalls............................................................................................................. 18<br />

Secure Mailer (aka Postfix) ........................................................................................................... 19<br />

U.S. DOE CIAC’s Network Security Tools [19]........................................................................... 20<br />

The Network Mapper (NMAP)...................................................................................................... 22<br />

Network Address Translation ........................................................................................................ 23<br />

Maguire xxxvi of xlii<br />

maguire@kth.se <strong>2010</strong>.03.21 Internetworking/Internetteknik

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!