Security Protocols

This section explores key protocols and technologies that secure communication over untrusted networks. These include encryption, tunneling, and segmentation techniques to ensure data confidentiality and integrity.

Protocol / Tech

Description

Use Case

SSH (Secure Shell)

Secure remote access protocol using encryption and key authentication. Supports tunneling, file transfer, and remote command execution.

Secure remote login to servers and network devices.

IPsec (Internet Protocol Security)

Suite of protocols for securing IP traffic via encryption and authentication. Works in transport or tunnel mode.

Site-to-site or remote-access VPNs.

IKEv2 (Internet Key Exchange v2)

Protocol for setting up security associations in IPsec. Supports fast reconnection and mobility.

Mobile VPNs, secure key negotiation.

DMZ (Demilitarized Zone)

Network segment exposed to external users but isolated from internal LAN. Hosts public services like web or mail servers.

Hosting internet-facing apps securely.

Firewall

Security system that filters traffic based on rules. Protects networks from unauthorized access.

Enforcing access control between networks.

MACsec (802.1AE)

Link-layer encryption for LAN security. Encrypts Ethernet frames to prevent snooping.

Securing Layer 2 segments in enterprise networks.

RFC: RFC 4251–4254

Main Features:

  • Encrypted remote access to devices and servers

  • Supports tunneling, port forwarding, and file transfers (SCP/SFTP)

  • Key-based authentication and session security

Use Cases:

  • Secure system administration

  • File transfer over insecure networks

Alternative Protocols:

  • Telnet (insecure, legacy)

  • RDP – for graphical remote access

RFC: RFC 4301 (Framework), RFC 4303 (ESP), RFC 2402 (AH)

Main Features:

  • Encrypts and authenticates IP packets

  • Supports transport and tunnel mode

  • Often used in VPNs and secure WAN communication

Use Cases:

  • Enterprise VPNs (site-to-site or remote access)

  • Secure communication between data centers

Alternative Protocols:

  • SSL VPN (OpenVPN, WireGuard)

  • MACsec – for Layer 2 encryption