Virtual Private Networks

Slides:



Advertisements
Similar presentations
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Advertisements

VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
SCSC 455 Computer Security Virtual Private Network (VPN)
IPsec: Internet Protocol Security Chong, Luon, Prins, Trotter.
Encryption and Firewalls Chapter 7. Learning Objectives Understand the role encryption plays in firewall architecture Know how digital certificates work.
Guide to Network Defense and Countermeasures Second Edition
TCP/IP Protocol Suite 1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 30 Internet Security.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
Internet Security Seminar Class CS591 Presentation Topic: VPN.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Virtual Private Networks Shamod Lacoul CS265 What is a Virtual Private Network (VPN)? A Virtual Private Network is an extension of a private network.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
1 ECE453 – Introduction to Computer Networks Lecture 19 – Network Security (II)
PSeries Technical Conference L19 Brian Dolan-Goecke Atlanta, GeorgiaOctober 8-12, 2001 Linux VPN.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
An Introduction to Encrypting Messages on the Internet Mike Kaderly INFS 750 Summer 2010.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Cyber Security for Energy Delivery Systems NSTB What’s an ICP ? And why is it Useful for Utilities ? Dave Teumim, CISSP Teumim Technical, LLC.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
Module 10: Providing Secure Access to Remote Offices.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
Secure Communications ● Cleartext vs. encryption and encapsulation ● Protocols not to use ● SSH – scp/ftp – SSH tunnelling ● VPN.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Virtual Private Network Access for Remote Networks
CSCI 465 Data Communications and Networks Lecture 26
VPNs & IPsec Dr. X Slides adopted by Prof. William Enck, NCSU.
Virtual Private Networks and IPSec
Virtual Private Networks
Virtual Private Networks
Providing Teleworker Services
Virtual Private Network (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Microsoft Windows NT 4.0 Authentication Protocols
Virtual Private Networks
Virtual Private Networks
Chapter 18 IP Security  IP Security (IPSec)
Internet and Intranet Fundamentals
IPSec IPSec is communication security provided at the network layer.
Providing Teleworker Services
Virtual Private Networks (VPN)
CIT 480: Securing Computer Systems
Network+ Guide to Networks 6th Edition
Virtual Private Network (VPN)
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Seminar Class CS591 Presentation Topic: VPN
Virtual Private Networks
Security Protocols in the Internet
Providing Teleworker Services
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
VPN: Virtual Private Network
Providing Teleworker Services
Virtual Private Networks (VPNs)
Unit 8 Network Security.
Virtual Private Networks (VPN)
Topic 12: Virtual Private Networks
Presentation transcript:

Virtual Private Networks What is a Virtual Private Network (VPN)? How do VPNs work? How is security achieved? How secure is a VPN? What sort of VPN is right for your application? 30-Nov-18 Jeff Rupp CS691

VPN: What is it VPNs provide a means to have access to an internal network from a remote location via the Internet They are called ‘Virtual’ since the data is still traveling through the public network, but both the data and the header can be encrypted 30-Nov-18 Jeff Rupp CS691

How do VPNs work VPNs consist of a gateway to the internal network and any number of remote clients The gateway is the machine to which the clients connect The gateway provides the server side encryption/decryption and user authentication 30-Nov-18 Jeff Rupp CS691

How VPNs Work The most common standard in use today is IPSec as established by the Internet Engineering Task Force (IETF) IPSec allows for 2 modes of operation: Transport: only the packet data is encrypted, the header is in the clear Tunnel: both header and data are encrypted 30-Nov-18 Jeff Rupp CS691

Security The first step in a VPN session is authentication, where the user and host authenticate each other via X.509, LDAP The next step is to establish a key typically using the Diffie/Hellman protocol (public/private keys) Packets are encrypted with this shared secret key, as public/private key cryptography is slower than secret key The secret key may be changed may times during a single VPN session. 30-Nov-18 Jeff Rupp CS691

Security IPSec does not dictate the encryption algorithm that is used Most common is Triple DES apply DES 3 times with unique keys each time Some vendors have their own proprietary algorithm These vendors would be worth avoiding, since if their algorithm is ever broken, then your system may be compromised 30-Nov-18 Jeff Rupp CS691

Speed The limiting factor in the speed of a VPN system is the complexity of the encryption/decryption. A software only solution provides acceptable bandwidth for 1-2 clients Speed is dependent on the platform, and other loads on the VPN gateway Large scale VPNs require a hardware solution, called a VPN Appliance These appliances range in speed from 20Mbit - 200Mbit 30-Nov-18 Jeff Rupp CS691

Choosing a VPN All VPNs provide a software solution for the client, so the only hardware piece needs to be the gateway If your system will support more than 2 simultaneous clients then a VPN appliance is the best choice If you restrict the VPN gateway’s duties to VPN (not firewall, etc) then a software server side solution is acceptable for 1-2 simultaneous clients 30-Nov-18 Jeff Rupp CS691

References G2 Firewall Solutions Brief http://www.securecomputing.com Mar 05, 2003 Virtual Private Network Consortium http://www.vpnc.org/vpn-standards.html Windows 2000 Step-by-Step Guid to Internet Protocol Security (IPSec) http://www.microsoft.com/windows2000/techinfo/planning/security/ipsecsteps.asp Scott, Charlie; Wolfe, Paul; Erwin, Mike Virtual Private Networks, Second Edition O’Reilly & Associates, Inc 1999 Network World, Inc., 2002 Product database from 10/28/2002 30-Nov-18 Jeff Rupp CS691