Richard Henson University of Worcester November 2016

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Enabling Secure Internet Access with ISA Server
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Module 5: Configuring Access for Remote Clients and Networks.
Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Guide to Operating System Security Chapter 9 Web, Remote Access, and VPN Security.
Intranet, Extranet, Firewall. Intranet and Extranet.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Network Services Networking for Home and Small Businesses – Chapter.
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Networks – Network Architecture Network architecture is specification of design principles (including data formats and procedures) for creating a network.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Component 9 – Networking and Health Information Exchange Unit 1-1 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
COMP3123 Internet Security Richard Henson University of Worcester November 2010.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
The Intranet.
Presented by Rebecca Meinhold But How Does the Internet Work?
COMP3371 Cyber Security Richard Henson University of Worcester November 2015.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Secure Communications ● Cleartext vs. encryption and encapsulation ● Protocols not to use ● SSH – scp/ftp – SSH tunnelling ● VPN.
Defining Network Infrastructure and Network Security Lesson 8.
COMP3123 Internet Security Richard Henson University of Worcester November 2011.
VPN’s Andrew Stormer COSC 356 Fall What is a VPN? Acronym – Virtual Private Network Acronym – Virtual Private Network Connects two or more private.
Security fundamentals
Virtual Private Networks
IPSec Detailed Description and VPN
or call for office visit Chapter 6 - IPsec (IP Secure)
Virtual Private Networks
The Intranet.
Instructor Materials Chapter 5 Providing Network Services
Virtual Private Network (VPN)
Unit 28 Website Production
Microsoft Windows NT 4.0 Authentication Protocols
Instructor Materials Chapter 9: Testing and Troubleshooting
Understand the OSI Model Part 2
Networking for Home and Small Businesses – Chapter 6
Virtual Private Networks (VPN)
Lecture 6: TCP/IP Networking By: Adal Alashban
Working at a Small-to-Medium Business or ISP – Chapter 7
Networking for Home and Small Businesses – Chapter 6
Working at a Small-to-Medium Business or ISP – Chapter 7
Richard Henson University of Worcester November 2017
Virtual Private Network (VPN)
* Essential Network Security Book Slides.
I. Basic Network Concepts
Server-to-Client Remote Access and DirectAccess
Working at a Small-to-Medium Business or ISP – Chapter 7
Goals Introduce the Windows Server 2003 family of operating systems
Firewalls Routers, Switches, Hubs VPNs
AbbottLink™ - IP Address Overview
Introduction to Network Security
Cengage Learning: Computer Networking from LANs to WANs
Richard Henson University of Worcester October 2018
Networking for Home and Small Businesses – Chapter 6
Virtual Private Network zswu
Topic 12: Virtual Private Networks
Presentation transcript:

Richard Henson University of Worcester November 2016 COMP3371 Cyber Security Richard Henson University of Worcester November 2016

Week 6: Securing LAN data using Firewalls, VPNs, etc. Objectives: Relate Internet security issues to the TCP/IP protocol stack Explain principles of firewalling Explain what a Proxy Service is, and why it can be a more flexible solution than a firewall Explain Internet security solutions that use the principles of a VPN

Security and the OSI layers Simplified TCP/IP model… Levels 1/2/3 combined as network Levels 5/6/7 combined as application HTTP FTP SMTP NFS DNS SNMP TCP UDP IP (network)

TCP/IP and the Seven Layers screen TCP (Transport Control Protocol) and IP (Internet Protocol) only make up part (layers 3 & 4) of the seven layers upper layers interface with TCP to produce the screen display lower layer packets required to interface with hardware to create/convert electrical signals Each layer represents a potential security vulnerability (!) app vulnerab… port vulnerab… TCP IP network vulnerab… hardware

Intranet Misunderstood term uses secure user authentication achieved by organisations using http to share data internally in a www-compatible format Many still call a protected file structure on its own an Intranet… (technically incorrect!) uses secure user authentication uses secure data transmission system Implemented as EITHER: single LAN (domain) with a web server (see diagram) several interconnected LANs (trusted domains) cover a larger geographic area

Extranet An extension of the Intranet beyond organisation boundary to cover selected trusted “links” e.g. customers and business partners uses the public Internet as its transmission system requires authentication to gain access Can provide secure TCP/IP access to: paid research current inventories internal databases any unpublished information

Securing Authentication through Extranets Connected Windows networks? Use Kerberos… ? VPN? BUT… several TCP ports used for authentication when establishing a session… Solution: firewall configuration allows relevant ports to be opened only for “trusted” hosts

Issues in creating an Extranet Public networks… Security handled through appropriate use of secure authentication & transmission technologies… If using the Internet… client-server web applications across different sites BUT security issues need resolving Could use a VPN (Virtual Private Network) Private leased lines between sites do not need to use http, etc. more secure, but expensive (BALANCE)

Unsecured LAN-Internet Connection: Router Only INTERNET/EXTERNAL NETWORK ROUTER – packet navigation, no filtering Internal Network ...

An Unsecured LAN-Internet Connection via Router Layer 3 Layer 3 Data through Unchanged Routed by IP address tables Layer 2 Layer 2 Layer 1 Layer 1 router

Securing Sharing of Data through Extranets One solution: Extranet client uses the web server & browser for user interaction secure level 7 application layer www protocols developed https: ensure that pages are only available to authenticated users Ssh (secure shell) : secure download of files secure level 4 transport (TLS) protocol to restrict use of IP navigation to only include secure sites Relevant firewall ports should be opened Port 22 if SSH data Port 443 if TCP data sent using http-s (secure http) Port 1723 if data sent as packets using VPN (later…)

The Internet generally uses IP - HOW can data be secured? 2016: more than a billion hosts!

Securing the Extranet Problem: IP protocol sends packets off in different directions according to: destination IP address routing data packets can be intercepted/redirected What about penetration through other protocols, working at different OSI layers? VPN controls the path of packets routed through IP addresses of secure servers

Other Secure level 7 protocols More about SSH SSH-1 1995, University of Helsinki, secure file transfer uses TCP port 22 runs on a variety of platforms Enhanced version SSH-2 using the PKI including digital certificates RFC 4252 – recent, 2006

Creating a “Secure Site”? To put it bluntly… a LAN that provides formidable obstacles to potential hackers keeps a physical barrier between local server and the internet linked through an intermediate computer called a Firewall or Proxy Server Restrictions on access security provided by authentication between level 4 & 7

Lower OSI layers security (Stage 1) Simple Firewall… packet filtering by header IP address fooled by “IP spoofing” TCP port filtering – data associated with blocked ports filtered out TCP port also held in packet header

Unsecured LAN-Internet Connection: Firewall INTERNET/EXTERNAL NETWORK FIREWALL – packet filtering Internal Network ...

Firewall Configuration Firewall blocks data via TCP port (logical) used by each application protocol connects to TCP all ports blocked… no data gets through unless (lol!) … https://www.youtube.com/watch?v=doAnB5_eDnw Configuration… includes which ports to block as well as which IP addresses to block… Includes auditing of packets

An Unsecured LAN-Internet Connection via Firewall IP filtering slows down packet flow… may not be necessary? Risk? Also… request by a LAN client for Internet data across a router reveals the client IP address generally a desired effect…. “local” IP address must be recorded on the remote server picks up required data & returns it via the router and server to the local IP address problem – could be intercepted, and future data to that IP address may not be so harmless…

An Unsecured LAN-Internet Connection via Router Another problem: wrath of IANA IP address awarding & controlling body big penalties if ANY internal LAN IP address conflicts with an existing Internet IP address they allocated… Safeguard: use DHCP (dynamic host configuration protocol) allocate client IP from within a fixed range allocated to that domain by IANA

A LAN-Internet connection via Gateway INTERNET/EXTERNAL NETWORK e.g. TCP/IP GATEWAY – packet conversion local protocol Internal Network ...

A LAN-Internet connection via Gateway At a gateway, processing can be at higher OSI levels: >= level 4 Local packets converted into other formats… remote network does not have direct access to the local machine IP packets only recreated at the desktop local client IP addresses therefore do not need to comply with IANA allocations

A LAN-Internet connection via Proxy Server INTERNET/EXTERNAL NETWORK e.g. TCP/IP Proxy Server – local IP addresses local protocol Internal Network ...

The Proxy Server Acts like a Gateway in some respects: provides physical block between external and internal networks But can still use the same protocol (e.g. TCP/IP), and can cache web pages for improved performance

VPNs (Virtual Private Networks) Two pronged defence: physically keeping the data away from unsecured servers… several protocols available for sending packets along a pre-defined route data encapsulated and encrypted so it appears to travel as if on a point-point link but is still secure even if intercepted Result: secure system with pre-determined pathways for all packets

VPNs: OSI levels 1-3: restricted use of the Physical Internet VPN shown in green

Principles of VPN protocols The tunnel - where the private data is encapsulated (or ”wrapped”) The VPN connection interfaces - where the private data is encrypted before entering the tunnel (and vice versa)

Principles of VPN protocols Emulate a point-to-point link: data encapsulated with header provides routing information allows packets to traverse the shared public network to its endpoint To emulate a private link: data encrypted for confidentiality Any packets intercepted on the shared public network are indecipherable without the encryption keys…

Using a VPN as part of an Extranet

Using a VPN for point-to-point

Using a VPN to connect a remote computer to a Secured Network

Potential weakness of the VPN Once the data is encrypted and in the tunnel it is very secure BUT watch for gaps… if any part of that journey is outside the tunnel… e.g. network path to an outsourced VPN provider scope for security breaches

VPN-related protocols offering even greater Internet security Two possibilities are available for creating a secure VPN: Layer 3: IPsec – fixed point routing protocol Layer 2 “tunnelling” protocols encapsulate the data within other data before converting it to binary data: PPTP (Point-point tunnelling protocol) L2TP (Layer 2 tunnelling protocol)

IPsec First VPN system defined by IETF RFC 2401 uses ESP (encapsulating security protocol) at the IP packet level IPsec provides security services at the IP layer by: enabling a system to select required security protocols (ESP possible with a number of encryption protocols) determining the algorithm(s) to use for the chosen service(s) putting in place any cryptographic keys required to provide the requested services

More about IPSec in practice Depends on PKI for authentication both ends must be IPSec compliant, but not the various network systems that may be between them… Can therefore be used to protect paths between a pair of hosts a pair of security gateways a security gateway and a host Can work with IPv4 and IPv6

Layer 2 Security: PPTP, L2TP Microsoft: PPTP CISCO L2F (layer 2 forwarding) Combine to create L2TP IPSec optional: Adv of L2TP: can use PPP authentication and access controls (PAP and CHAP!) uses NCP to handle remote address assignment of remote client no IPSec, no overhead of reliance on PKI