RFC 4301 Security Architecture for the Internet Protocol
RFC 4302 IP Authentication Header
RFC 4303 IP Encapsulating Security Payload
RFC 4304 Extended Sequence Number Addendum
RFC 4307 Cryptographic Algorithms for IKEv2
RFC 4308 Cryptographic Suites for IPSec
RFC 4309 Using Advanced Encryption Standard with ESP
RFC 4478 Repeated Authentication in IKEv2
RFC 4543 GMAC in IPSec ESP and AH
RFC 4555 IKEv2 Mobility and Multihoming Protocol (MOBIKE)
RFC 4621 Design of the IKEv2 Mobility and Multihoming (MOBIKE) Protocol
RFC 4718 IKEv2 Clarifications and Implementation Guidelines
RFC 4806 Online Certificate Status Protocol (OCSP) Extensions to IKEv2
RFC 4809 Requirements for an IPSec Certificate Management Profile
RFC 4945 PKI Profile of IKEv1/ISAKMP, IKEv2, and PKIX
IPSec v3: Security Architecture for the Internet Protocol
Security Policy Database (SPD)
Security Association Database (SAD)
Peer Authorization Database (PAD)
Security Associations
Key Management
Multicast
IP Traffic Processing
ICMP Processing
Other Issues
Differences from RFC 2401
Authentication Header (AH)
Format and Structure
Fields
Galois Message Authentication Code (GMAC)
GMAC Lab:
Study operation of Message Authentication Codes in general and attributes and operation of GMAC code used in IPSecv3 specifically
LAB debrief/group discussion
IP Packet Processing
Differences from RFC 2402
AH Lab
View call traces of traffic that uses the Authentication Header with and without Encapsulating Security Payload. Lab includes hacks against and countermeasures to ESP and AH security vulnerabilities.
LAB debrief/group discussion
Encapsulating Security Payload (ESP)
Format and Structure
Fields
Advanced Encryption Standard (AES) with ESP
AES Lab
Step through AES encryption procedure as a paper exercise and review possible attacks and countermeasures
LAB debrief/group discussion
IP Packet Processing
Differences from RFC 2406
ESP Lab
View call traces of encrypted network traffic using the Encapsulated Security Payload
Lab debrief/group discussion
IKEv2 and ISAKMP
Extended Sequence Number Addendum
Cryptographic Algorithms for IKEv2
Repeated Authentication in IKEv2
IKEv2 Mobility and Multihoming Protocol (MOBIKE)
Design of the IKEv2 Mobility and Multihoming (MOBIKE) Protocol
MOBIKE Lab
Sample design and security specification exercise with implementation checklist for MOBIKE system
Lab debrief and group discussions
IKEv2 Clarifications and Implementation Guidelines
Online Certificate Status Protocol (OCSP) Extensions to IKEv2
Requirements for an IPsec Certificate Management Profile
PKI Profile of IKEv1/ISAKMP, IKEv2, and PKIX
IKEv1 and v2/ISAKMP Lab
View call traces of completed and aborted tunnel establishment and key exchange using IKE v1 and v2 and ISAKMP
This exercise is a group exercise covering the pros, cons and trade-offs of standard and non-standard cryptographic suites and issues of security vs vulnerability that come with the large number of possible combinations of IPSec protocol options, ESP encryption and integrity and IKE and IKEv2 encryption, pseudo-random functions, integrity and Diffie-Hellman groups