Virtual Private Network zswu

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Internet Protocol Security (IP Sec)
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Guide to Network Defense and Countermeasures Second Edition
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
VPN – Virtual Private Networking. VPN A Virtual Private Network (VPN) connects the components of one network over another network. VPNs accomplish this.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Network Security Philadelphia UniversitylAhmad Al-Ghoul Module 12 Module 12 Virtual Private Networks  MModified by :Ahmad Al Ghoul  PPhiladelphia.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
1. Collision domains are unsecure 2. The employees often need to remote access to corporate network resources  The Internet traffic is much more vulnerable.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration VPNs.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Karlstad University IP security Ge Zhang
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
V IRTUAL P RIVATE N ETWORKS K ARTHIK M OHANASUNDARAM W RIGHT S TATE U NIVERSITY.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Virtual Private Network. Computer Center, CS, NCTU 2 What is a VPN  Used to connect two private networks together via the Internet.
IP Security
Virtual Private Networks
Virtual Private Network
Virtual Private Networks and IPSec
Virtual Private Network
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Virtual Private Networks
IPSec Detailed Description and VPN
IPSecurity.
Module 9: Configuring Network Access
Virtual Private Networks
Virtual Private Networks
Virtual Private Network (VPN)
Microsoft Windows NT 4.0 Authentication Protocols
Chapter 18 IP Security  IP Security (IPSec)
IT443 – Network Security Administration Instructor: Bo Sheng
UNIT.4 IP Security.
Virtual Private Networks (VPN)
CIT 480: Securing Computer Systems
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Server-to-Client Remote Access and DirectAccess
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Virtual Private Networks (VPN)
Topic 12: Virtual Private Networks
Chapter 6 IP Security.
Presentation transcript:

Virtual Private Network zswu VPN Virtual Private Network zswu

Introduction Uses public telecommunication channels, such as the Internet or other network service, instead of leased lines channels. Described as Virtual because it is distant connection using private connections. Used to widely now because of today's globalization. Connects users or branches. Used to use dial-up or Leased communication, now using IP-VPN’s

What is VPN Extension of a private network that encompasses links across shared or public networks like the Internet. Enable to send data between two computers across a shared or public internetwork in a manner that emulates the properties of a point-to-point private link.

Common Uses of VPNs (1/3) 1. Remote Access Over the Internet Source

Common Uses of VPNs (2/3) 2. Connecting Networks Over the Internet (Site to Site VPN) Source

Common Uses of VPNs (3/3) 3. Connecting Computers over an Intranet (similar to 1.) Source

Why Use VPN? Cheap Scalable Security Legacy private network uses remote connectivity through dial-up modems or through leased line connections, it’s expensive. Scalable Extending a leased line connection is complex. Easy to administer. Security Provide encryption and file integrity.

VPN Key Concept - Tunneling VPN consists of a set of point to point connections tunneled over the Internet. In order to achieve tunneling, the packets are encapsulated as the payload of packets. Payloads, to and from addresses, port numbers and other standard protocol packet headers As seen by the external routers carrying the connection

Basic VPN Requirements User Authentication Key Management Address Management Data Encryption

Basic VPN Requirements (1/2) User Authentication Verify the VPN client's identity and restrict VPN access to authorized users only. Provide audit and accounting records to show who accessed what information and when. X.509, pre-shared key, etc. Key Management Generate and refresh encryption keys for the client and the server. Simple Key Management for IP: ISAKMP/Oakley, etc.

Basic VPN Requirements (2/2) Address Management Assign a VPN client's address on the intranet and ensure that private addresses are kept private Data Encryption No one outside the VPN can alter the VPN. Data carried on the public network must be rendered unreadable to unauthorized clients on the network.

VPN Security Authentication Access Control Confidentiality Ensuring that the data originates at the source that it claims. Access Control Restricting unauthorized users from gaining admission to the network. Confidentiality Preventing anyone from reading or copying data as it travels across the Internet. Data Integrity Ensuring that no one tampers with data as it travels across the Internet.

Common Implementations Based on PPP Point-to-Point Tunneling Protocol (PPTP) (PPP + encryption + GRE) Layer Two Tunneling Protocol (L2TP) (PPTP + L2F) Based on TCP/IP L2TP/IPsec IPsec Tunnel mode [RFC 4301] BGP/MPLS IP VPN [RFC 4364] SSL/TLS Secure Socket Tunneling Protocol (SSTP) (PPTP + SSL) SSL VPN OpenVPN

PPP - Point-to-Point Protocol PPP [RFC 1661] provides a standard method for transporting multi- protocol datagrams over point-to-point (direct) links. => Data link layer (layer 2) protocol Three components Encapsulation (for transporting purpose) Link Control Protocol (for data-link connectability) Network Control Protocols (NCP) family (L3 management support) Extra Options Authentication: PAP, CHAP, EAP, MS-CHAP, MS-CHAPv2, etc. Link Quality and error detection Compression Encryption: MPPC + MPPE, etc. Multilink (MP, The PPP Multilink Protocol)

Tunneling Protocol Allows a network user to access or provide a network service that the underlying network does not support or provide directly. (Wikipedia) GRE (Generic Routing Encapsulation): Establish a virtual point-to-point connection between two networks. IP as a delivery protocol Virtual Tunnel: (Tunnel) IP header + GRE packet header Encapsulation, not encryption PPTP / L2TP IPsec OpenVPN (with SSL/TLS) etc.

PPTP - Point-to-Point Tunneling Protocol PPTP [RFC 2637] uses an enhanced GRE mechanism to provide a flow- and congestion-controlled (TCP) encapsulated datagram service for carrying PPP packets. PPTP creates a GRE tunnel through which the PPTP GRE packets are sent. Source

Security of PPTP PPTP has been the subject of many security analyses and serious security vulnerabilities have been found MS-CHAP is fundamentally insecure. MS-CHAPv2 is vulnerable to dictionary attack on the captured challenge response packets. The PPP payload can be encrypted by using Microsoft Point to Point Encryption (MPPE) when using MS-CHAPv1/v2 EAP-TLS (Extensible Authentication Protocol – TLS) is the superior authentication choice for PPTP.

L2TP - Layer Two Tunneling Protocol L2TP [RFC 2661]: PPTP + L2F (Layer Two Forwarding) High level protocols (e.g., PPP) establish L2TP session (“call”) within the L2TP tunnel, and traffic for each session is isolated. A tunnel can contains multiple connections at once. L2TP over IP internetworks uses UDP and a series of L2TP messages for tunnel maintenance. L2TPv3 provides additional security features, improved encapsulation, and the ability to carry data links other than simply PPP over an IP network. (Wikipedia) Source

L2TP/IPsec L2TP does not provide confidentiality or strong authentication. Usually use IPsec ESP (Encapsulating Security Payload) to encrypt the L2TP packet. Data encryption begins before the PPP connection process by negotiating an IPSec security association. Require computer-level authentication using computer certificates. Source

IPsec IPsec [RFC 4301] is a secure network protocol suite provides authentication and encryption ability over IPv4 network. Two modes in IPsec Transport mode: Insert IPsec header (AH/ESP) between IP and TCP header, then modify original IP header. Tunnel mode: Encapsulate original packet, and prepend new IP and IPsec header. Two functions that ensure confidentiality: Authentication Header (AH) Provide source authentication and integrity without encryption. Encapsulating Security Payload (ESP) Provide both data authentication, data integrity and data encryption. Security Associations (SA) provides the parameters necessary for AH and/or ESP operations. IKE (Internet Key Exchange): Provide authentication and key exchange. e.g., ISAKMP, OAKLEY

IPsec Modes Source

SSL VPN A form of VPN that can be used with a standard Web browser. The traffic is encrypted with the SSL protocol or Transport Layer Security (TLS) protocol.

Appendix I Am Anonymous When I Use a VPN – 10 Myths Debunked Virtual Private Networking: An Overview BeyondCorp by Google: Protected connection from untrusted networks without the use of a VPN. See also: Role-Based Access Control (RBAC) Protocol reference VPN PPP / GRE / PPTP / L2TP IPsec / IKE IP protocol numbers