Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Guide to Network Defense and Countermeasures Second Edition
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
11 Setting Up a Virtual Private Network
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Guide to Network Defense and Countermeasures Second Edition
Virtual Private Networks and IPSec
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Internet Protocol Security (IPSec)
Remote Networking Architectures
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Virtual Private Network
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
NetComm Wireless VPN Functionality Feature Spotlight.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
1 Guide to Network Defense and Countermeasures Chapter 7.
Chapter 11: Setting up a Virtual Private Network.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Guide to Firewalls and VPNs, 3 rd Edition Chapter Ten Setting Up A Virtual Private Network.
Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 4: Configuring Site to Site VPN with Pre-shared keys.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Virtual Private Network (VPN)
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
Guide to Network Security First Edition Chapter Five Network Authentication and Remote Access Using VPN.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
Guide to Network Defense and Countermeasures Third Edition
Securing Access to Data Using IPsec Josh Jones Cosc352.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network (VPN)
VPN: Virtual Private Network
Topic 12: Virtual Private Networks
Presentation transcript:

Setting Up a Virtual Private Network Chapter 9

Learning Objectives Understand the components and essential operations of virtual private networks (VPNs) Describe the different types of VPNs Create VPN setups such as mesh or hub-and- spoke configurations Choose the right tunneling protocol for your VPN Enable secure remote access for individual users via a VPN Observe best practices for configuring and maintaining VPNs effectively

VPNs Goal: Provide a cost-effective and secure way to connect businesses to one another and remote workers to office networks Encapsulate and encrypt data being transmitted Use authentication to ensure that only approved users can access the VPN Provide a means of secure point-to-point communications over the public Internet

VPN Components and Operations Essential components that make up a VPN How VPNs enable data to be accessed securely Advantages and disadvantages of using VPNs compared to leased lines How VPNs extend network boundaries

Components within VPNS Hardware devices Can have two endpoints or terminators Can have a (virtual) tunnel Software that performs security-related activities

Devices That Form the Endpoints of the VPN Server running on a tunneling protocol VPN appliance A firewall/VPN combination A router-based VPN

Essential Activities of VPNs IP encapsulation Data payload encryption Encrypted authentication

IP Encapsulation Provides a high degree of protection VPN encapsulates actual data packets within packets that use source and destination addresses of VPN gateway Source and destination information of actual data packets are completely hidden Because a VPN tunnel is used, source and destination IP addresses of actual data packets can be in private reserved blocks not usually routable over the Internet

Data Payload Encryption Transport method Tunnel method

Encrypted Authentication Hosts are authenticated by exchanging long blocks of code (keys) that are generated by complex formulas (algorithms) Types of keys that can be exchanged Symmetric keys Asymmetric keys

Advantages and Disadvantages of VPNs

VPNs Extend a Network’s Boundaries To deal with the increased risk caused by VPN connections Use two or more authentication tools to identify remote users Integrate virus protection Set usage limits

Types of VPNs Site-to-site VPN Links two or more networks Client-to-site VPN Makes a network accessible to remote users who need dial-in access

VPN Appliances Hardware devices specially designed to terminate VPNs and join multiple LANs Permit connections, but do not provide other services (eg, file sharing, printing) Enable connections of more tunnels and users than software systems Examples SonicWALL series Symantec Firewall/VPN appliance

Advantage of Using Hardware Systems

Software VPN Systems Generally less expensive than hardware systems Tend to scale better for fast-growing networks Examples F-Secure VPN+ Novell BorderManager VPN services Check Point FireWall-1

VPN Combinations of Hardware and Software Cisco 3000 Series VPN Concentrator Gives users the choice of operating in:  Client mode, or  Network extension mode

VPN Combinations of Different Vendors’ Products Challenge: Get all pieces to talk to and communicate with one another successfully Pick a standard security protocol that is widely used and that all devices support (eg, IPSec)

VPN Setups If two participants Configuration is relatively straightforward in terms of expense, technical difficulty, and time If three or more, several options Mesh configuration Hub-and-spoke arrangement Hybrid setup

Mesh Configuration Connects multiple computers that each have a security association (SA) with all other machines in the VPN

Hub-and-Spoke Configuration A single VPN router maintains records of all SAs Any device that wishes to participate in the VPN need only connect to the central router Easy to increase size of the VPN The requirement that all communications flow into and out of the central router slows down communications

Hybrid Configuration Benefits from the strengths of each— scalability of hub-and-spoke option and speed of mesh option Use mesh for most important branches of the network and critical communications Use hub-and-spoke for overseas branches and for new new branch offices

Configurations and Extranet and Intranet Access Extranet Enable firewalls and anti-virus software for each remote user or business partner Intranet Establish usage limits Set up anti-virus and firewall protection

Configurations and Extranet and Intranet Access

Tunneling Protocols Used with VPNs IPSec/IKE PPTP (Point-to-Point Tunneling Protocol) L2TP (Layer 2 Tunneling Protocol) PPP over SSL (Point-to-Point Protocol over Secure Sockets Layer) PPP over SSH (Point-to-Point Protocol over Secure Shell)

IPSec/IKE IPSec provides: Encryption of the data part of packets Authentication Encapsulation between two VPN hosts Two security methods (AH and ESP) Capability to work in two modes (transport and tunnel) IKE provides: Exchange of public and private keys Ability to determine which encryption protocols should be used to encrypt data that flows through VPN tunnel

PPTP Developed by Microsoft for granting VPN access to remote users over dial-up connections Uses Microsoft Point-to-Point Encryption (MPPE) to encrypt data Useful if support for older clients is needed Compatible with Network Address Translation (NAT) Replaced by L2TP

L2TP Extension to PPP that enables dial-up users to establish a VPN connection to a remote access server Uses IPSec to encrypt data Incompatible with NAT but provides a higher level of encryption and authentication

PPP Over SSL and PPP Over SSH Two UNIX based methods for creating VPNs Both combine existing tunnel system (PPP) with a way of encrypting data in transport (SSL or SSH) SSL  Public key encryption system used to provide secure communications over the Web SSH  UNIX secure shell that uses secret key encryption (pre-shared key) to authenticate participants

When to Use Different VPN Protocols

Enabling Remote Access Connections within VPNs Issue the user VPN client software Make sure user’s computer is equipped with anti-virus software and a firewall May need to obtain a key for the remote user if you plan to use IPSec to make VPN connection as well

Configuring the Server Major operating systems include ways of providing secure remote access Linux  IP Masquerade feature Windows XP and 2000  Network Connections Wizard

Configuring the Server

Configuring Clients Involves either installing and configuring VPN client software or using the Network Connection Wizard Client workstation must be protected by a firewall

VPN Best Practices Security policy rules that specifically apply to the VPN Integration of firewall packet filtering with VPN traffic Auditing the VPN to make sure it is performing acceptably

The Need for a VPN Policy Identify who can use the VPN Ensure that all users know what constitutes proper use of the VPN Whether and how authentication is to be used Whether split tunneling is permitted How long users can be connected at any one session Whether virus protection is included

Packet Filtering and VPNs Encryption and decryption of data can be performed either outside the packet-filtering perimeter or inside it

PPTP Filter Rules

L2TP and IPSec Packet-Filtering Rules

Auditing and Testing the VPN Time consuming Choose client software that is easy for end users to install on their own to save you time and effort

Chapter Summary Configuration and operations of VPNs