Virtual Private Networks

Slides:



Advertisements
Similar presentations
Enabling Secure Internet Access with ISA Server
Advertisements

Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Module 10: Troubleshooting Network Access. Overview Troubleshooting Network Access Resources Troubleshooting LAN Authentication Troubleshooting Remote.
Module 5: Configuring Access for Remote Clients and Networks.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 13: Planning Server and Network Security.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Wi-Fi Security January 21, 2008 by Larry Finger. Wi-Fi Security Most laptops now come with built-in wireless capability, which can be very handy; however,
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Networking Components Chad Benedict – LTEC
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Getting Connected to NGS while on the Road… Donna V. Shaw, NGS Convocation.
Course 201 – Administration, Content Inspection and SSL VPN
Network Address Translation (NAT) CS-480b Dick Steflik.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
Module 11: Remote Access Fundamentals
Wireless Networks and the NetSentron By: Darren Critchley.
Supercomputing Communications Data NCAR Scientific Computing Division NETS 12/10/ Network Engineering & Telecommunications Section Update Jim Van.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
CAEN Wireless Network College of Engineering University of Michigan October 16, 2003 Dan Maletta.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Lecture 16 Page 1 Advanced Network Security Perimeter Defense in Networks: Virtual Private Networks Advanced Network Security Peter Reiher August, 2014.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
The University of Oklahoma Virtual Private Network How it works.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
Module 10: Windows Firewall and Caching Fundamentals.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
Brianne Stewart.   A wireless network is any computer network that is not connected with a cable  Many homes use this type of internet access  Less.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
An Analysis on NAT Security
Virtual Private Networks
Virtual Private Network Access for Remote Networks
Getting Connected to NGS while on the Road…
Virtual Private Networks and IPSec
Chapter Objectives In this chapter, you will learn:
Virtual Private Networks
Instructor Materials Chapter 6 Building a Home Network
Configuring ALSMS Remote Navigation
Microsoft Windows NT 4.0 Authentication Protocols
Virtual Private Networking with OpenVPN
Common Methods Used to Commit Computer Crimes
Instructor Materials Chapter 9: Testing and Troubleshooting
Securing the Network Perimeter with ISA 2004
Configuring and Troubleshooting Routing and Remote Access
Introduction to Networking
Introduction to Networking
Security of a Local Area Network
NET323 D: Network Protocols
IS4550 Security Policies and Implementation
Digital Pacman: Firewall Edition
Firewalls Routers, Switches, Hubs VPNs
Getting Connected to NGS while on the Road…
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 4: Planning and Configuring Routing and Switching.
Firewalls Jiang Long Spring 2002.
AbbottLink™ - IP Address Overview
Topic 12: Virtual Private Networks
Presentation transcript:

Virtual Private Networks One way to get through the firewall NCAR’s VPN Experience Jeff Custard Westnet 14-Feb-2001

NCAR’s security perimeter Who is inside? Most users on UCAR campuses Dial-in users connecting to UCAR dialups Who is outside? Users at UCAR divisions that have elected to remain outside the perimeter Dial-in users connecting to external ISPs Anyone else on the Internet at large

NCAR VPN Solution A conceptual diagram of what we wanted to achieve

NCAR’s VPN devices Cisco VPN Concentrator 3015 PowerPC equipped, software based VPN gateway 100 simultaneous users (unlimited client license) 4 Mbps aggregate traffic Expandable with the addition of Scalable Encryption Processors (SEP) with capacity for 1500 simultaneous users and 50 Mbps throughput. We purchased the upgradeable version of this product so it could scale if needed Cisco VPN Concentrator 3015 (from the Altiga acquisition)

The Linux solution Dedicated box Penguin Computing Linux server 500MHz Celeron/256MB RAM 2 x 10/100 NICs FreeS/WAN v.1.8

NCAR’s VPN client solutions Windows Cisco IPSec client Linux FreeS/WAN Macintosh and Solaris No current solution Cisco client solution coming 3/2001 (Cisco’s VPN 5000 series supports them now)

Windows VPN solution 2 Cisco IPSec client flavors W95 through WNT4.0 Windows 2000 (beta version available now because we participated in the beta testing program—NON-beta version due out 3/2001)

Windows VPN solution Cisco IPSec client Establishes IPSec tunnel to Cisco VPN Concentrator 3015 (and closes off all other network access when enabled) We use a group ID and password to establish tunnel (can also use certificates) We then validate the user on their UCAR “gatekeeper password” via RADIUS The IPSec group determines how you access and use the remote network. For example, it specifies access hours, number of simultaneous logins, user authentication method, and the IPSec algorithms your VPN Client uses. These parameters are set by the VPN administrator.

Windows client issues Why not use PPTP? Leaves other PC connectivity open (the Cisco client disables all other access) Must be administrator to install on NT and W2K Client configuration issues 3015 can automatically send DNS, WINS, gateway, etc., settings to client (our setup requires users to enter their appropriate WINS settings) Must control the distribution of the Cisco IPSec client Q: I have a Windows 2000 system and it has Microsoft PPTP VPN software built in. Why can't I just use that? A: UCAR's security policies require that any system that is connected to our internal network (which includes via a VPN link) and is also connected to an external network implement access restrictions. PPTP does not implement these restrictions and is thus deemed unsafe to use to connect to UCAR. PPTP, which has been banned by CSAC because it leaves the machine at the remote end of the VPN wide open to the rest of the Internet, has officially been disabled on the VPN box. Q: How are nodes or networks connected to the UCAR internal network via a VPN connection treated as far as CSAC is concerned? A: CSAC has approved a clarification to the External Network Connectivity policy that will explicitly treat nodes or networks connected to the UCAR internal network via a VPN the same as fully exposed hosts that are directly connected to the UCAR internal network. This means those hosts must follow the exposed host security standards to avoid becoming a back door around our security filters. The immediate consequence of this is that the PPTP protocol on Windows machines cannot be used for VPNs, because it does not disable other connectivity to the machine and NetBIOS file sharing is not allowed on exposed hosts (a PPTP VPN with NetBIOS turned off is seen as being too difficult for the average user and of limited usefulness anyway; there is little point in setting up a VPN if you can't do file sharing). The Cisco VPN client is acceptable under this policy because it completely shuts down all local network connectivity to the machine while the VPN is active, which is more than sufficient to meet the exposed host security standards. It was felt, however, that having hosts with NetBIOS running that is exposed to a foreign network while VPN connected to UCAR is simply too unsafe. There are canned hacking tools out there that will permit script kiddies to take over any machine with an exposed NetBIOS service.

Legal issues Cisco VPN client issues From the legal point of view, we have four classes of users: UCAR employees who install the software onsite UCAR employees who download the software to their home systems Remote users within the US Remote users outside the US Categories 1-3 are not a problem as long as we take "reasonable precautions" (defined in the legal sense) to make sure that the person we are giving the software to is really who they claim to be, really fits within the designated category, and that this person does not make the software available to anyone they are not supposed to. Category 4 requires an export license (which we are not going to get, so foreign users have no "clean" solution for the time being unless they can find a way to obtain the Cisco VPN client software other than from us) We did receive a green light from UCAR Legal to distribute the Cisco VPN client software based on authentication of a UCAR employee's gatekeeper password only. If the user can prove in this manner that they are a UCAR employee, that is considered legally sufficient to prove that they are within the US, and we would not have to run any additional checks against their point of origin nor would the user have to certify anything, which means a more-or-less ordinary FTP download could be used. This means we could implement something like a class of FTP users (in the wu-ftpd sense) that can authenticate with their own gatekeeper passwords, and then have access to the VPN software. Unfortunately, since some users with valid gatekeeper passwords are not employees (and are in fact foreigners), it won't be as simple as using a standard gatekeeper authentication module, it will require an additional check of the user name against a list of users that are known to be local employees. Such a list could be obtained from the online NCAR phone book, so there is at least some chance of automating this whole process.

Linux VPN solution FreeS/WAN (www.freeswan.org) Known to work with Linux and BSD Must recompile the kernel Linux client must comply with CSAC security standards for fully exposed hosts (disabling services or using ipchains to block access; IP firewalling must be enabled in the kernel) Q: What do I have to do to be sure that I am in compliance with UCAR computer security requirements? A: On Windows, the software we use automatically shuts down all other connectivity to the system when the VPN is up, so you don't need to do anything. On Linux, you need to either turn off all services that are not allowed under our security requirements, or use ipchains to block access from external networks to services you are running that are not allowed. We can provide ipchains scripts that will automatically turn on access blocks when your VPN comes up and turn them off when it comes down. You need to be sure that IP Firewalling is enabled in your kernel. To see the nitty gritty details of our security requirements, go to http://www.ucar.edu/csac and click on "Security Standards for Exposed Hosts". The relevant documents are the "External Network Connectivity Policy" and the "Network Services Standards". Q: Is there any way to network with machines on my local net at the same time that I have a VPN connection to UCAR? A. For Windows, the answer is no. There is no way to do this safely. For Linux, the answer is a qualified "yes" but it requires some knowledge of the Linux kernel's firewall system (ipchains) in order to be able to keep local connections open while still meeting our security requirements. (The answer for *BSD would be similar to that for Linux). Ensure that your system is in compliance with the CSAC security standards for fully exposed hosts. Unlike the Windows client, while the Freeswan VPN is up, connectivity to the rest of the network is still open, therefore you must take steps to ensure that your system is not a back door around our security perimeter. Note that this also means that you must agree to permit the UCAR Security Administrator to scan your host to verify compliance, as with any other exposed host on UCAR's network. I can probably help you write some ipchains firewall rules to accomplish this, and it is possible to impose restrictions on access to your machine only while the VPN is up (although of course for you own protection you should be taking security precautions anyway; unsecured Linux systems are a fairly easy target for hackers). To see what kinds of restrictions are involved here, go to http://www.ucar.edu/csac and click on "Security Standards for Exposed Hosts".

Other Wireless info: Addresses the WEP insecurity issue Right now we’re not requiring it (but CSAC may in the future) I’ll talk about the WEP insecurity issue more in my wireless talk

VPN performance impacts Wired ~4.5% TCP “performance hit” ~8.5% UDP Wireless ~7-8% TCP (I got ~25% with Cisco IPSec client) ~20-25% UDP (I got ~8% with Cisco IPSec client) My informal tests are available from links off the NETS VPN project web page

Other VPN issues Check applications using local IP address (e.g., PC X-Window programs) Must set application to use the IPSec “client IP address” from VPN client software NAT issues Windows client will masquerade UDP connections Linux—NAT device must forward IPSec packets (or have a Linux box do IP masquerading for other hosts behind it also run FreeS/WAN)

Miscellaneous What didn’t work (or what we decided not to use) Certificates We could import our existing private CA and IPSec sub-CA certificates Unsuccessful in making it accept an identity certificate. (couldn’t find correct format to use) PGP client with certificates would have solved Macintosh and W2K; used W2K beta client instead PPTP Left client machine too insecure

Miscellaneous “LAN-to-LAN” connections For Linux users with FreeS/WAN Made them work, but too much overhead (separate manual configuration information entry for each user) No present Mac and Solaris solution Solved with new Cisco IPSec client in 3/2001? No OSPF routing advertisements for VPN client IP addresses Not available in current version Set static route for this group of IP addresses

Miscellaneous What worked (or “we took the easy way out”) Windows client solved Windows access (W2K beta testing program involvement) FreeS/WAN solved Linux access (required separate server purchase) Solving the problem for Windows and Linux users covered most of our user base

Conclusion Details and more information on NETS “Projects page” http://www.scd.ucar.edu/nets/projects/vpn Questions?