SCSC 455 Computer Security Virtual Private Network (VPN)

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
11 Setting Up a Virtual Private Network
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Guide to Network Defense and Countermeasures Second Edition
Virtual Private Networks and IPSec
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Remote Networking Architectures
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Virtual Private Network
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
Virtual Private Networks Alberto Pace. IT/IS Technical Meeting – January 2002 What is a VPN ? u A technology that allows to send confidential data securely.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
1 Guide to Network Defense and Countermeasures Chapter 7.
Chapter 11: Setting up a Virtual Private Network.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Guide to Firewalls and VPNs, 3 rd Edition Chapter Ten Setting Up A Virtual Private Network.
Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing.
By Kevin Stevens UAT NTS4150. Definition: A Virtual Private Network (VPN) is a technology that allows secure communication via a “tunnel,” across public.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
1 Virtual Private Networks (VPNs) and IP Security (IPSec) G53ACC Chris Greenhalgh.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Virtual Private Network (VPN)
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
Guide to Network Defense and Countermeasures Third Edition
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
VPN’s Andrew Stormer COSC 356 Fall What is a VPN? Acronym – Virtual Private Network Acronym – Virtual Private Network Connects two or more private.
Virtual Private Networks
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Virtual Private Networks
Virtual Private Networks (VPN)
Virtual Private Network (VPN)
Cengage Learning: Computer Networking from LANs to WANs
Virtual Private Networks (VPN)
Presentation transcript:

SCSC 455 Computer Security Virtual Private Network (VPN)

How to connect LANs There’re common demands of joining two or multiple LANs to facilitate corporate communications secure point-to-point communications The connection can only used by authenticated LANs / hosts One solution (traditional one) is to use private leased lines Problems: don’t scale well, cost is high, and the complexity of maintaining the leased lines Another solution – virtual private networks

VPNs Goal of VPNs Provide a cost-effective and secure way to connect businesses to one another and remote workers to office networks Functionalities of VPNs Encapsulate and encrypt data being transmitted Use authentication to ensure that only approved users can access the VPN Provide a means of secure point-to-point communications over the public Internet

Index VPN components and operations Types of VPNs VPN setups Tunneling protocols used with VPNs Enabling secure remote access connections within VPNs VPNs best practices

Components within VPNS VPNs consist of two different types of components Hardware devices two endpoints (terminators) Encryption, authentication, and encapsulation a (virtual) tunnel A series of connections between two endpoints than makes use of Internet-based hosts/servers Software that performs security-related activities

Essential Activities of VPNs Three essential activities of VPNs IP encapsulation Data payload encryption Encrypted authentication

IP Encapsulation VPN encapsulates actual data packets within packets that use source and destination addresses of VPN gateway The benefits of encapsulating IP packets Source and destination information of actual data packets are completely hidden source and destination IP addresses of actual data packets can be in private reserved blocks not usually routable over the Internet

Data Payload Encryption VPNs do NOT encrypt the header within packets, only the data payload that the packets carry. The encryption can be performed in one of two ways: Transport method  The host encrypts traffic when it’s generated Tunnel method  The traffic is encrypted and decrypted in transit, somewhere between the source host and destination.

Encrypted Authentication Authentication is essential Hosts in the network that receive VPN communication need to know that the host originating the communications is an approved user of the VPN Hosts are authenticated by exchanging long blocks of code - keys Types of keys that can be exchanged in an encrypted transaction:  Symmetric keys  Asymmetric keys

Index VPN components and operations Types of VPNs VPN setups Tunneling protocols used with VPNs Enabling secure remote access connections within VPNs VPNs best practices

Types of VPNs Two types of VPNs Site-to-site VPN  Links two or more networks Client-to-site VPN  Makes a network accessible to remote users who need dial-in access These two types VPNs are NOT mutually exclusive e.g., a large corporations’ network support both site-to-site VPN and client-to-site VPN

Advantage of Using Hardware Systems

Software VPN Systems Software VPN are generally less expensive than hardware systems Tend to scale better for fast-growing networks Examples F-Secure VPN+ Novell BorderManager VPN services Check Point FireWall-1

Index VPN components and operations Types of VPNs VPN setups Tunneling protocols used with VPNs Enabling secure remote access connections within VPNs VPNs best practices

Index VPN components and operations Types of VPNs VPN setups Tunneling protocols used with VPNs Enabling secure remote access connections within VPNs VPNs best practices

Tunneling Protocols Used with VPNs In the past, firewalls support VPNs used proprietary protocols Both endpoints must use the same brand of firewall Today the proprietary protocols are used less often. Most VPNs use standard tunneling protocols IPSec/IKE PPTP (Point-to-Point Tunneling Protocol) L2TP (Layer 2 Tunneling Protocol) PPP over SSL (Point-to-Point Protocol over Secure Sockets Layer) PPP over SSH (Point-to-Point Protocol over Secure Shell)

IPSec/IKE IPSec provides: Encryption of the data part of packets Authentication Encapsulation between two VPN hosts Two security methods (AH and ESP)  Authenticated header is used to authenticate packets  Encapsulating Security Payload encrypts the data portions of the packet IPSec is commonly combined with IKE as means of using public key cryptography to encrypt data IKE provides: Exchange of public keys Ability to determine which encryption protocols should be used to encrypt data that flows through VPN tunnel

Other tunneling protocols: PPTP PPTP is developed by Microsoft for granting VPN access to remote users over dial-up connections Uses Microsoft Point-to-Point Encryption (MPPE) to encrypt data Useful if support for older clients is needed Compatible with Network Address Translation (NAT) Replaced by L2TP

Other tunneling protocols: L2TP L2TP is an extension of Point-to-point Protocol (PPP) that enables dial-up users to establish a VPN connection to a remote access server Uses IPSec rather than MPPE to encrypt data provides a higher level of encryption and authentication Incompatible with NAT

Other tunneling protocols: PPP Over SSL and PPP Over SSH PPP over SSL and PPP over SSH are two UNIX based methods for creating VPNs Both combine existing tunnel system (PPP) with a way of encrypting data in transport (SSL or SSH) SSL  Public key encryption system used to provide secure communications over the Web SSH  UNIX secure shell that perform secure authenticated logons and encrypted communications between a client and a server.

When to Use Different tunneling Protocols (important!)