Virtual Private Network

Slides:



Advertisements
Similar presentations
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Advertisements

Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
IP Security. Overview In 1994, Internet Architecture Board (IAB) issued a report titled “Security in the Internet Architecture”. This report identified.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
1 Pertemuan 11 IPSec dan SSL Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
K. Salah1 Security Protocols in the Internet IPSec.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
PPTP Point-to-Point Tunneling Protocol (PPTP) –Problem: PPP was created for dialing into a local RAS server –But the site’s RAS may be far away –Long-distance.
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Security IPsec 1 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
K. Salah1 Security Protocols in the Internet IPSec.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Presentaion on ipsecurity Presentaion given by arun saraswat To lavkush sharma sir arun saraswat1.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
IP Security
CSCI 465 Data Communications and Networks Lecture 26
VPNs & IPsec Dr. X Slides adopted by Prof. William Enck, NCSU.
Virtual Private Networks and IPSec
Virtual Private Networks
IPSec Detailed Description and VPN
UNIT 7- IP Security 1.IP SEC 2.IP Security Architecture
IPSecurity.
Virtual Private Networks
Providing Teleworker Services
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Encryption and Network Security
Virtual Private Networks
Chapter 18 IP Security  IP Security (IPSec)
Internet and Intranet Fundamentals
IT443 – Network Security Administration Instructor: Bo Sheng
VPN: Virtual Private Network
IPSec IPSec is communication security provided at the network layer.
Virtual Private Networks (VPN)
Cryptography and Network Security
IP Security - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall Slides by Henric Johnson Blekinge Institute.
IP Security - Chapter 6 of William Stallings. Network Security Essentials (2nd edition). Prentice Hall Slides by Henric Johnson Blekinge Institute.
VIRTUAL PRIVATE NETWORKS (VPN)
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
Virtual Private Network
VPN: Virtual Private Network
NET 536 Network Security Lecture 5: IPSec and VPN
Network Security Essentials
Introduction to Network Security
Virtual Private Networks (VPN)
Virtual Private Network zswu
Topic 12: Virtual Private Networks
B. R. Chandavarkar CSE Dept., NITK Surathkal
Chapter 6 IP Security.
Presentation transcript:

Virtual Private Network Dr. Muazzam A. Khan

Virtual Private Networks Introduction What security problems do VPNs solve ? What security problems are not solved by VPNs ? VPN Principles of operation: tunneling, encapsulation, encryption and authentication VPN Technologies: Microsoft PPTP, L2TP and IPsec

History and background of VPNs 1 Internet multi-site organisations operated private networks using leased lines. This approach was expensive and inflexible. It became cheaper to use shared Internet than dedicated.

Virtual Private Networks Virtual Private Network is a type of private network that uses public telecommunication, such as the Internet, instead of leased lines to communicate. VPNs enabled more flexible use of larger networks by removing network geography constraints from shared-insider LAN/Intranet associations and services.

What problems do VPNs solve ? Avoiding costs of fixed lines. Extending security context of LAN across sites, regardless of geography, including to mobile users. Authentication: knowing who your users are. Encryption: preventing monitoring of use of insecure client server applications at the network level.

What security problems do VPNs not solve ? Traffic analysis: monitoring of packet sizes, network usage times, endpoints of conversation etc. VPNs can be used with firewalls, by encapsulating traffic prohibited by organisation policy within a firewalled perimeter which the firewall can't inspect or control.

Tunneling Typically a VPN consists of a set of point to point connections tunnelled over the Internet. The routers carrying this traffic over the Internet see each P2P connection externally as a sequence of packets routed between endpoints.

VPN Architecture ISP Access Server VPN Device leased circuits Office Telephone Line VPN Device Employee’s Home Internet Backbone VPN Tunnel VPN Tunnel Office VPN Device VPN is transparent to the users, ISP, and the Internet as a whole; It appears to be simply a stream of packets moving across the Internet Backbone

Encapsulation In order to achieve tunnelling, The packets including payloads, to and from addresses, port numbers and other standard protocol packet headers are encapsulated as the payload of packets as seen by the external routers carrying the connection.

Authentication A digital signing scheme is typically used to enable verification of the VPN principals. Note that both the client and the server need to authenticate each other. Message authentication codes, hashes or checksums are typically used to authenticate message contents.

Encryption To protect the privacy of the connection from external snooping, the payload of the packets visible externally will be encrypted. To enable routing over conventional networks, the packet headers of the 2nd encapsulating packets are not encrypted, but the packet headers of the 1st encapsulated packets are encrypted along with their contents.

VPN Topology: Types of VPNs Remote access VPN Site-to-Site VPN

Types of VPNs Remote Access VPN Provides access to internal corporate network over the Internet. Reduces long distance technical support costs. Corporate Site Internet

Types of VPNs Site-to-Site VPN Connects multiple offices over Internet Corporate Site Remote Access VPN Site-to-Site VPN Connects multiple offices over Internet Reduces dependencies on frame relay and leased lines Internet Branch Office

Types of VPNs Remote Access VPN Site-to-Site VPN Extranet VPN Provides business partners access to critical information (Fin, sales tools, etc) Reduces transaction and operational costs Corporate Site Internet Partner #2 Partner #1

LAN clients with sensitive data Types of VPNs Remote Access VPN Site-to-Site VPN Extranet VPN Intranet VPN: Links corporate headquarters, remote offices, and branch offices over a shared infrastructure using dedicated connections. Database Server LAN clients Internet LAN clients with sensitive data

VPN Topology: How it works Operates at layer 2 or 3 of OSI model Layer 2 frame – Ethernet Layer 3 packet – IP

VPN Components: Protocols IP Security (IPSec) Transport mode Tunnel mode Point-to-Point Tunneling Protocol (PPTP) Uses PPP (Point-to-Point Protocol)

VPN Components: Protocols Layer 2 Tunneling Protocol (L2TP) Exists at the data link layer of OSI Composed from PPTP and L2F (Layer 2 Forwarding) Compulsory tunneling method

Point-to-Point Tunneling Protocol (PPTP) Layer 2 remote access VPN distributed with Windows product family Based on Point-to-Point Protocol (PPP) Uses proprietary authentication and encryption Limited user management and scalability Corporate Network Remote PPTP Client PPTP RAS Server Internet ISP Remote Access Switch

PPP Point-to-Point Protocol (PPP) PPP was created for dialing into a local RAS (Remote Access server) But the site’s RAS may be far away Long-distance calls are expensive RAS Long-Distance Call

PPTP Point-to-Point Tunneling Protocol (PPTP) We would like PPP to work over the Internet to avoid long-distance telephone charges But PPP is only a data link layer protocol It is only good for transmission within a subnet (single network) RAS

PPTP The Point-to-Point Tunneling Protocol (PPTP) makes this possible Created by Microsoft Widely used Access Concentrator RAS

PPTP PPTP Operation User dials into local PPTP access concentrator host User sends the access concentrator a PPP frame within an IP packet Access Concentrator RAS Packet

PPTP PPTP Operation Access concentrator places incoming IP packet within another IP packet Sends packet to the distant RAS Access Concentrator RAS Encapsulated Packet

PPTP PPTP Operation Distant RAS removes the original packet Deals with the PPP frame within the packet RAS

PPTP PPTP Encapsulation Access concentrator receives the original IP packet, which has the IP address of the access concentrator Adds an enhanced general routing encapsulation (GRE) header for security Adds a new IP header with the IP address of the RAS Original IP Packet Enhanced GRE Header New IP Header RAS Access Concentrator Tunnel

IPSec IPSec is an Internet Engineering Task Force (IETF) standard suite of protocols that provides data authentication confidentiality key management Applicable to use over LANs, across public & private WANs, & for the Internet IP-level security encompasses three functional areas: authentication, confidentiality, and key management. The authentication mechanism assures that a received packet was transmitted by the party identified as the source in the packet header, and that the packet has not been altered in transit. The confidentiality facility enables communicating nodes to encrypt messages to prevent eavesdropping by third parties. The key management facility is concerned with the secure exchange of keys. IPSec provides the capability to secure communications across a LAN, across private and public WANs, and across the Internet.

IPSec Uses Transparency Stallings Figure 16.1 illustrates a typical IP Security scenario. An organization maintains LANs at dispersed locations. Nonsecure IP traffic is conducted on each LAN. For traffic offsite, through some sort of private or public WAN, IPSec protocols are used. These protocols operate in networking devices, such as a router or firewall, that connect each LAN to the outside world. The IPSec networking device will typically encrypt and compress all traffic going into the WAN, and decrypt and decompress traffic coming from the WAN; these operations are transparent to workstations and servers on the LAN. Secure transmission is also possible with individual users who dial into the WAN. Such user workstations must implement the IPSec protocols to provide security. Security Associations A one-way relationship between sender & receiver that affords security for traffic flow Can be between A pair of hosts A host and a security gateway A pair of security gateways

Benefits of IPSec Its below transport layer, hence transparent to applications Can be transparent to end users Can provide security for individual users [MARK97] lists the benefits shown for IPSec. It also plays a vital role in the routing architecture required for internetworking.

Architecture & Concepts Tunnel vs. Transport mode Security association (SA) Security parameter index (SPI) Security policy database (SPD) SA database (SAD) Authentication header (AH) Protocol Encapsulating security payload (ESP) Protocol

Transport Mode vs. Tunnel Mode Transport mode: host -> host Tunnel mode: gateway->gateway Encrypted Tunnel Gateway 1 Gateway 2 Encrypted Unencrypted A Unencrypted B The difference between end-to-end (transport) mode and end-to-intermediate (tunnel) mode. Transport mode provides protection primarily for upper-layer protocol payloads, by inserting the AH after the original IP header and before the IP payload. Typically, transport mode is used for end-to-end communication between two hosts. Tunnel mode provides protection to the entire IP, after the AH or ESP fields are added to the IP packet, the entire packet plus security fields is treated as the payload of new “outer”IP packet with a new outer IP header. Tunnel mode is used when one or both ends of an SA are a security gateway, such as a firewall or router that implements IPSec. New IP Header AH or ESP Header TCP Data Orig IP Header

Transport Mode ESP protects higher layer payload only IP header IP options IPSec header Higher layer protocol ESP Real IP destination AH ESP protects higher layer payload only AH can protect IP headers as well as higher layer payload

Tunnel Mode ESP applies only to the tunneled packet Outer IP header IPSec header Inner IP header Higher layer protocol ESP Real IP destination Destination IPSec entity AH ESP applies only to the tunneled packet AH can be applied to portions of the outer header