Seminar Class CS591 Presentation Topic: VPN

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Virtual Private Networks and IPSec
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Virtual Private Networking Karlene R. Samuels COSC513.
Internet Security Seminar Class CS591 Presentation Topic: VPN.
Internet Protocol Security (IPSec)
Remote Networking Architectures
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Virtual Private Network
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
WAN Technologies Dial-up modem connections
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks
Virtual Private Networks
Virtual Private Networks
Virtual Private Network
Virtual Private Networks and IPSec
Virtual Private Networks
IPSec Detailed Description and VPN
Virtual Private Networks
Providing Teleworker Services
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Virtual Private Networks
VPN: Virtual Private Network
Virtual Private Network (VPN)
Virtual Private Networks (VPN)
Virtual Private Networks
VIRTUAL PRIVATE NETWORKS (VPN)
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
Network Security (contd.)
Goals Introduce the Windows Server 2003 family of operating systems
Virtual Private Network
Virtual Private Networks
VPN: Virtual Private Network
Virtual Private Networks (VPN)
Virtual Private Network zswu
Topic 12: Virtual Private Networks
Presentation transcript:

Seminar Class CS591 Presentation Topic: VPN Internet Security Seminar Class CS591 Presentation Topic: VPN

Virtual Privacy Network What is VPN? Extension of an enterprise’s private intranet across a public network by Encrypt the user’s data Validate the user’s data Authenticate the source of the data Establish & maintain cryptographic secrets

Virtual Private Network Why business use VPN? Cost – ISP/NSP vs leased lines Simplified Infrastructure – No modem bank Secured – Encrypted, Authenticated, Integrally Safe Interoperable – supports multiple protocols Distributed, Deployable, Scalable Cost: Reduce carrier and access cost by eliminating long distance & 800-line charges Infrastructure: Eliminates need of modem bank. Only required VPN Server to be online on net & consolidate remote access & internet channel. Central management on a single server.

Virtual Private Network

Virtual Private Network Type of VPN Networks Branch office connection (Intranet) Business partner/supplier network Extranet E-Business Remote access Mobile IP                                                                                                                   

Virtual Private Network Branch office connection                                                                                                                                                              

Virtual Private Network Business partner/supplier network                                                                                                                                                              

Virtual Private Network Remote access                                                                                                                                                              

Virtual Private Network How VPN works? Create dedicated link using tunneling Basic components of a tunnel: A tunnel initiator (TI) A routed network An optional tunnel switch One or more tunnel terminators (TT)

Virtual Private Network Protocols standardized by IETF IPSec IKE L2F PPTP L2TP IKE – Internet Key Exchange formerly Internet Security Association Key Management Protocol (ISAKMO/Oakley)

Virtual Private Network

Virtual Private Network IPSec Proposed by CISCO to IETF as standard Initially used by firewall & security products Secures network or packet processing layer of the communication model 2 choices of security services: Authentication Header (AH) Encapsulating Security Payload (ESP) AH – essentially allows authentication of the sender of data ESP – supports both authentication of the sender and encryption of data as well Specific information associated with each of these services is inserted into the packet that follows the IP packet header. Separate key protocols can be selected such as IKE

Virtual Private Network CISCO IPSec with IKE Diffie-Hellman DES MD5/SHA Diffie-Hellman – Public-Key method for key exchange DES – Data Encryption Standard MD5/SHA – Message Digest 5/SHA hash algorithm are used to authenticate packet data

Virtual Private Network IKE Protocol for Internet Key Exchange Formerly Internet Security Association & Key Management Protocol (ISAKMP/Oakley) ISAKMP manages negotiation of security Oakley using Diffie-Hellman establish key

Virtual Private Network L2F Tunneling protocol created by CISCO Mechanism for transporting link-layer frames of higher-layer protocols eg PPP VPDN NAS – ISP Home Gateway - Corporation

Virtual Private Network PPTP Point-to-Point Tunneling Protocol Developed by Microsoft, 3com, Ascend, ECI Encapsulates PPP packets across IP-based internet Encryption RSA-RC4

Virtual Private Network L2TP Combination of PPTP and L2F Make multiple simultaneous tunnel btw pt Allow administrators to dedicate task to specific tunnels

Virtual Private Network

Virtual Private Network VPN Technology Firewalls Intrusion Detection Tools Authentication Servers Encryption & Key Exchange

Virtual Private Network Implementation Networking Connectivity Intranet or Extranet or Remote Access Product or Service Provider VPN Gateway Software only (<1.5Mbps connection only) Firewall based Router based Authentication Methods RADIUS, PKI, X509 (ITU), LDAP

Virtual Private Network Routers and Firewalls with encryption capability. Pros: Encryption upgrades, if available, can be cost effective. Cons: Mixing vendor solutions can create compatibility issues that inhibit VPN capability. May not be able to provide PC-to-LAN capability without additional software support. Could require commitment to vendor's proprietary technology. May not provide multi-protocol support. Installation and configuration can add to network complexity. Encryption processing overhead may reduce performance.

Virtual Private Network Traditional Remote Access Server (RAS) with VPN add-on. Pros: May allow IT to take advantage of an existing hardware investment. Cons: Traditional Remote Access Servers are not optimized for VPN. VPN add-ons may only be available for some high-end RAS solutions. May be ISP dependent, requiring the company to adopt the same RAS VPN vendor as the ISP. May not provide multi-protocol support. May require vendor proprietary software.

Virtual Private Network NOS/Server-Based VPN Pros: More robust solution for PC-to-LAN access than that provided by firewalls or routers. Cons: Difficult to set up and manage VPN functionality. Adding VPN services to a network server can impact performance while decreasing fault tolerance. Dedicating a network server to remote access can be prohibitively expensive.

Virtual Private Network VPN Services Pros: Security and performance can be guaranteed for a price. Requires limited corporate support. Cons: IT gives up control to the service provider. May not provide multi-protocol support. May not provide PC-to-LAN access. VPN services may be cost prohibitive.

Virtual Private Network Dedicated VPN Software Pros: Optimized to create LAN-to-LAN connections via VPN. Dedicated VPN solution creates fault tolerance. Standalone VPN solutions can offer greater performance. Dedicated VPN solutions are generally easier to use and support than solutions originally designed for non-VPN functions such as firewalls, routers, network servers and traditional remote access servers. Eliminates the need for costly frame relay circuits, leased lines, etc. Cons: Vendor proprietary software is needed for each server hosting VPN and each remote client accessing the LAN via VPN. Must invest in a dedicated server for maximum performance. Adding VPN software on an existing, in-use network server decreases fault tolerance and performance. Many solutions support IP-only VPNs and cannot transport packets from multiple protocols.

Virtual Private Network Dedicated VPN Hardware Pros: Easy to install, configure and manage. Saves money by reducing equipment needs at corporate site. Stand-alone solution offers greater performance and fault tolerance because it is optimized for VPN functionality. Reduces costs of upgrading hardware as remote access technology changes. Reduces costs of upgrading system as the number of users increases. Cons: Some solutions do not support multiple protocols. Some LAN-to-LAN VPN solutions require costly software add-ons to support remote client PCs. Some solutions require that proprietary software be loaded on the remote client's PC.

Virtual Private Network SECURITY STANCE Permit all access initially; administrator specifically denies individual access according to security policy. Deny all access initially; administrator specifically permits individual access according to security policy.

Virtual Private Network Security Techniques Packet Filters Circuit-level Gateways Application-level Gateways Possible Security Breach/Risk from RA Unauthorized Remote Access (RA) Computer RA computer connected to insecure network Virus infected RA computer

Virtual Private Network Company supporting VPN Microsoft IBM Novell CISCO Nokia 3com

Virtual Private Network FAQ Difference between VPN and Firewall? Diifference between VPN and Proxy? Build own VPN or outsource to SP? Important critique? Interoperable? Scalability? Can U trust the internet? Any other Questions? Virtual Private Networks By Charlie Scott, Paul Wolfe and Mike Erwin, O'Reilly & Associates, March 1998

Virtual Private Network