Agenda Virtual Private Networks (VPNs) Motivation and Basics Deployment Topologies IPSEC (IP Security) Authentication Header (AH) Encapsulating Security.

Slides:



Advertisements
Similar presentations
IP Security have considered some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS however there are security concerns that.
Advertisements

Encrypting Wireless Data with VPN Techniques
All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
Guide to Network Defense and Countermeasures Second Edition
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
NAT TRAVERSAL FOR IPSEC Research Seminar on Datacommunications Software HIIT
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
IPsec: Internet Protocol Security Chong, Luon, Prins, Trotter.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Virtual Private Networks and IPSec
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
Configuration of a Site-to-Site IPsec Virtual Private Network Anuradha Kallury CS 580 Special Project August 23, 2005.
CCNA 5.0 Planning Guide Chapter 7: Securing Site-to-Site Connectivity
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Internet Protocol Security (IPSec)
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Virtual Private Network
NetComm Wireless VPN Functionality Feature Spotlight.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Securing Site-to-Site Connectivity Connecting Networks.
1 Guide to Network Defense and Countermeasures Chapter 7.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
Virtual Private Networks Warren Toomey. Available WAN Links.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
Generic Routing Encapsulation GRE  GRE is an OSI Layer 3 tunneling protocol: Encapsulates a wide variety of protocol packet types inside.
Virtual Private Networks (VPNs) Source: VPN Technologies: Definitions and Requirements. VPN Consortium, July 2008.VPN Technologies: Definitions and Requirements.
1 Virtual Private Networks (VPNs) and IP Security (IPSec) G53ACC Chris Greenhalgh.
FINAL YEAR PROJECT. FINAL YEAR PROJECT IMPLEMENTATION OF VPN USING IPSEC.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Chapter 8 IP Security MSc. NGUYEN CAO DAT Dr. TRAN VAN HOAI.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
IPSec VPN Chapter 13 of Malik. 2 Outline Types of IPsec VPNs IKE (or Internet Key Exchange) protocol.
Virtual Private Network Chapter 4. Lecturer : Trần Thị Ngọc Hoa2 Objectives  VPN Overview  Tunneling Protocol  Deployment models  Lab Demo.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Cryptography and Network Security (CS435) Part Thirteen (IP Security)
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
CSCI 465 Data Communications and Networks Lecture 26
Virtual Private Networks
IPSec Detailed Description and VPN
IPSecurity.
Virtual Private Networks
Virtual Private Networks
Chapter 18 IP Security  IP Security (IPSec)
Security Protocols in the Internet
Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls
Presentation transcript:

Agenda Virtual Private Networks (VPNs) Motivation and Basics Deployment Topologies IPSEC (IP Security) Authentication Header (AH) Encapsulating Security Payload CS G513 / SS G513 Network Security

Sundar B. VPN - Motivation Edge Security Goal: Separate a private network (LAN) from the public network. Typical mechanisms: Firewalls, Gateways, Proxies Works when edge (i.e. boundary) is clearly defined. In-Out or Out-In flow regulated systematically. Does not work when there is (geographical) segmentation of (logical) private network Mobility (of users/clients) – external access, roaming access.

Sundar B. VPN Motivation Both segmentation and mobility are familiar scenarios: Subnetting to VLAN Differences (between VLANs and VPNs): Segmentation in subnetting scenario happens within a (more) trusted private network whereas segmentation in private networks happens across an untrusted public network (the Internet). The primary motive of VLANs was traffic isolation – between subnets – not security. Subnets and subnet boundaries are L-2 artifacts whereas private-public boundaries are L-3

Sundar B. Virtual Private Networks Primary Purposes: Handling segmentation across the public network Site-to-Site VPNs Handling external access / roaming access Remote Access VPNs In summary, a VPN enables logical extension of private network(s) over the Internet using service provider backbones. Since the Internet (including the service provider) cannot be trusted (or inviolate in terms of security) VPNs need a security cover.

Sundar B. IPSEC IPSEC loosely refers to a phalanx of protocols for supporting Confidentiality, integrity and authenticity for IP datagrams between endpoints (of a VPN) Client to VPN termination point (a.ka. Server) in a remote-access VPN VPN server to VPN server in a site-to-site VPN The main components: IPSEC proper defines IP packet encapsulation for confidentiality, integrity and authentication as well as data encryption. Internet Key Exchange (IKE) automates key management and protocol negotiation bet. endpts

Sundar B. IPSEC modes Tunneling mode Encapsulates a complete IP packet including header i.e. header is hidden; A new IP header is added for forwarding the encrypting router’s IP address is used. Transport mode Uses underlying tunneling protocol (e.g. Cisco’s GRE)

Sundar B. IPSEC Headers IPSEC adds new header info. to an IP datagram: Authentication Header (AH) Provides integrity and authenticity for the packet including the invariant fields in the outer IP header Uses keyed hashing Encapsulating Security Payload (ESP) Provides confidentiality, integrity and authenticity of the data only (i.e. header info. Not included) Either or both the headers can be used. No restriction on encryption algorithms – can be negotiated bet. endpoints

Sundar B. Site-to-Site Topologies Fully-meshed topology Complete (logical) graph Very robust Cost saving compared to leased lines (or wide area networks) between sites. Hub-and-spoke topology Radial graph – spoke sites connect to a hub site. Hub site would require tunnel aggregation (routers) Useful when traffic is asymmetric i.e. mostly directed toward the hub Otherwise large transcription overhead at the hub

Sundar B. Site-to-Site Topologies Fully meshed on-demand topology w/ Tunnel End Discovery Complete Graph w/ dynamic IP addresses Tunnel end is discovered dynamically Dynamic Multipoint topology Allows both Spoke-Hub, as well as Spoke-Spoke tunneling. More flexible.

Sundar B. Pros and Cons Reduced cost compared to leased lines or WAN without compromising security Performance Penalties: Protocol overheads Additional burden in routing and forwarding – specialized solutions needed IP Address partitioning mechanisms are not always clean.