HP 635n Practical IPsec Deployment for Printing and Imaging Devices - Page 40

Print Job

Page 40 highlights

flow direction, and puts them in the SADB. NOTE: IKE populates the SADB on both the initiator and responder. • IPsec uses these entries to provide IPsec protection to the packet and sends the packet out on the network • The printer receives the IPsec protected packet and checks the SADB for a matching entry based upon the IP addresses and Security Parameters Index (SPI) • IPsec decrypts the packet and then checks the Security Policy to make sure the proper protection was used for the packet • IPsec strips off the IPsec headers and puts the packet back to normal Let's use Wireshark to see IKE in action and the actual IPsec protected packet being sent out. First, here is what a non-IPsec protected packet would look like. Remember, the IPsec policy was protecting TCP Port 9100 traffic or normal print data. Our print job is very simple: "Hello, World!" is what we are sending to the printer. Refer to Figure 31 - Print Job Figure 31 - Print Job Using Wireshark, we can see that a TCP connection is setup to port 9100 from IP address 192.168.0.50 to IP address 192.168.0.10. Since the destination port is 9100 and the destination IP address is 192.168.0.10, we can assume that 192.168.0.10 is a printer. Looking at packet 12, we do not see any text with the words "Hello World!" We do not see this information because the data has been processed through a driver and put into a format the printer can understand and process quickly. Do not mistake this for encryption! A person may wonder what you can do with this information. Well, Wireshark allows you to "Follow TCP Stream" as shown in Figure 32. 40

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193

40
flow direction, and puts them in the SADB. NOTE: IKE populates the SADB on both the
initiator and responder.
IPsec uses these entries to provide IPsec protection to the packet and sends
the packet out on the network
The printer receives the IPsec protected packet and checks the SADB for a matching entry
based upon the IP addresses and Security Parameters Index (SPI)
IPsec decrypts the packet and then checks the Security Policy to make sure the proper
protection was used for the packet
IPsec strips off the IPsec headers and puts the packet back to normal
Let’s use Wireshark to see IKE in action and the actual IPsec protected packet being sent out.
First,
here is what a non-IPsec protected packet would look like.
Remember, the IPsec policy was protecting
TCP Port 9100 traffic or normal print data.
Our print job is very simple: “Hello, World!” is what we
are sending to the printer.
Refer to Figure 31 – Print Job
Figure 31 – Print Job
Using Wireshark, we can see that a TCP connection is setup to port 9100 from IP address
192.168.0.50 to IP address 192.168.0.10.
Since the destination port is 9100 and the destination
IP address is 192.168.0.10, we can assume that 192.168.0.10 is a printer.
Looking at packet 12,
we do not see any text with the words “Hello World!”
We do not see this information because the
data has been processed through a driver and put into a format the printer can understand and
process quickly.
Do not mistake this for encryption!
A person may wonder what you can do with
this information.
Well, Wireshark allows you to “Follow TCP Stream” as shown in Figure 32.