Virtual Private Networks and Spawning Networks Department of Computer Science.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
Transitioning to IPv6 April 15,2005 Presented By: Richard Moore PBS Enterprise Technology.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Agenda Virtual Private Networks (VPNs) Motivation and Basics Deployment Topologies IPSEC (IP Security) Authentication Header (AH) Encapsulating Security.
Module 5: Configuring Access for Remote Clients and Networks.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Virtual Private Networks (VPN)
Virtual Private Networks and IPSec
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
VIRTUAL PRIVATE NETWORKS (VPN). GROUP MEMBERS ERVAND AKOPYAN ORLANDO CANTON JR. JUAN DAVID OROZCO.
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
VPN – Virtual Private Networking. VPN A Virtual Private Network (VPN) connects the components of one network over another network. VPNs accomplish this.
Remote Networking Architectures
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Network Security Philadelphia UniversitylAhmad Al-Ghoul Module 12 Module 12 Virtual Private Networks  MModified by :Ahmad Al Ghoul  PPhiladelphia.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Virtual Private Network
NetComm Wireless VPN Functionality Feature Spotlight.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Windows Server 2008 Chapter 9 Last Update
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
What Is Needed to Build a VPN? An existing network with servers and workstations Connection to the Internet VPN gateways (i.e., routers, PIX, ASA, VPN.
1. Collision domains are unsecure 2. The employees often need to remote access to corporate network resources  The Internet traffic is much more vulnerable.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
WAN Technologies Dial-up modem connections
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
The University of Oklahoma Virtual Private Network How it works.
Virtual Private Networks (VPNs) Source: VPN Technologies: Definitions and Requirements. VPN Consortium, July 2008.VPN Technologies: Definitions and Requirements.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
Virtuelne Privatne Mreže 1 Dr Milan Marković. VPN implementations  In the following sections we will discuss these popular VPN implementation methods,
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks
Virtual Private Network
Virtual Private Networks and IPSec
Virtual Private Networks
Virtual Private Networks
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network (VPN)
Cengage Learning: Computer Networking from LANs to WANs
Virtual Private Network zswu
Topic 12: Virtual Private Networks
Presentation transcript:

Virtual Private Networks and Spawning Networks Department of Computer Science

Wired Magazine Hype List Feb 1998 Virtual Private Networks Ranked #1 The wonderful thing about virtual private networks is that its myriad definitions give every company a fair chance to claim that its existing product is actually a VPN. But no matter what definition you choose, the networking buzz- phrase doesn't make sense. The idea is to create a private network via tunneling and/or encryption over the public Internet. Sure, it's a lot cheaper than using your own frame relay connections, but it works about as well as sticking cotton in your ears in Times Square and pretending nobody else is around. Other items on the list n Hacker Consultants n MiniDisc n Windows NT 5.0 n Interior Design

Overview What is a VPN ? Requirements and Motivation Scenarios Methods Practical VPN Spawning Networks : VPNs on the fly

What is a VPN ? Network : A Network consists of any number of devices which can communicate through some arbitrary method Private: –Data Privacy and data integrityPrivacy –Access is restricted to defined set of entities –Privacy of addressing and routing system  Addressing used by VPN community is separate and discrete from underlying shared network  Same for routing Virtual: –Private communication over shared network infrastructure e.g. Internet One Line Definition

What is a VPN ? Network : A Network consists of any number of devices which can communicate through some arbitrary method Private: –Data Privacy and data integrityPrivacy –Access is restricted to defined set of entities –Privacy of addressing and routing system  Addressing used by VPN community is separate and discrete from underlying shared network  Same for routing Virtual: –Private communication over shared network infrastructure e.g. Internet (encryption and authentication)

One Line Definition A VPN is a private network constructed within a public network infrastructure, such as the global internet One Line Definition

Scenarios Two end-systems e.g. e-commerce Remote access network –E.g. a large firm with hundreds of sales people in the field Site to Site –Branch Office connection network – intranet VPN –Business partner networks – extranet VPN Combination of above

Motivations Economics of Communications –Cheaper than constructing or leasing physical networks for private communication Communications Privacy –Depends on the technology used to construct the VPN Global Reachability Scalability ( compared to custom networks )

Requirements Data Security –Authentication –Confidentiality –Integrity Tunneling Mechanisms QoS Guarantees

Methods to construct VPNs Most common – TunnelingTunneling Tunnel connects two VPN endpoints –Traffic opaque to underlying IP backbone –IP backbone used as link-layer technology, where tunnel forms a virtual point-to-point link Advantages –Segregation of common host network from the VPN –Routing of VPN isolated from common host network –Encapsulate different protocol families

Methods to construct VPNs Most common – Tunneling Tunnel connects two VPN endpoints –Traffic opaque to underlying IP backbone –IP backbone used as link-layer technology, where tunnel forms a virtual point-to-point link Advantages –Segregation of common host network from the VPN –Routing of VPN isolated from common host network –Encapsulate different protocol families “tunneling" is a technology that allows a network transport protocol to carry information for other protocols within its own packets. For example, IPX data packets can be encapsulated in IP packets for transport across the Internet, which isn't normally possible

Tunnels Cons –Administrative overhead – manual configuration –Scaling problems – point to point or point to multipoint ? –QoS Performance issues  Encapsulation overhead  No control over path on the common network ( e.g. IP ) Three different protocols –Carrier protocol – e.g. most common is IP –Encapsulating protocol - (GRE, IPSec, L2F, PPTP, L2TP) –Passenger protocol - The original data (IPX, NetBeui, IP)

Encapsulating Protocols PPTP vs L2F –PPTP wraps PPP in IPPPTP PPP –L2F uses Layer Two protocols, such as Frame Relay and ATM, for tunneling. L2TP – –supposed to offer the best of PPTP and L2F –Supports multiple concurrent tunnels per client IPSec – broad based open solution for encryption and authentication on a per packet basis  Two modes – tunnel and transport  Integrated with L2TP for security ( transport mode ) Tunnels

Encapsulating Protocols PPTP vs L2F –PPTP wraps PPP in IPPPTP –L2F uses Layer Two protocols, such as Frame Relay and ATM, for tunneling. L2TP – –supposed to offer the best of PPTP and L2F –Supports multiple concurrent tunnels per client IPSec – broad based open solution for encryption and authentication on a per packet basis  Two modes – tunnel and transport  Integrated with L2TP for security ( transport mode ) The Point-to-Point Protocol (PPP) provides a method for transmitting datagrams over serial point-to-point links. Tunnels

PPTP Protocol –Data channel: PPP over IP GRE (Generic Routing Encapsulation) –Encapsulates link layer (PPP), communicates at network layer (IP) –Call setup handled in a control channel Tunnels

ISP Gateway PPTP Client Computer PPTP Server Computer PPP Encapsulator IP Packets SMB Packets PPTP Interface SLIP Interface PPP Decapsulator IP Packets PPTP Interface SLIP Interface IP Packets IP GRE Packets SMB Packets PPTP Tunneling Example Tunnels

PPTP Tunneling Example PPTP Interface IP Header TCP Header Payload Data PPP Header IP GRE Header PPP Encapsulator IP Header TCP Header Payload Data PPP Header IP Header TCP Header Payload Data SLIP Interface IP Header TCP Header Payload Data PPP Header IP GRE Header SLIP Header TCP/IP Packet Modem IP GRE is not handled by many firewalls Tunnels

PPTP in a Nutshell Tunnels

Practical VPN SSH Example

What is SSH ? Overview of Secure Shell. SSH is a secure replacement for the “r” utilities. Availability: Downloadable & Commercial versions. Resources: Both commercial and free are widely available. SSH is very popular and there’s a lot of expertise out there

SecureCRT The SecureCRT client application combines the secure logon and data transfer capabilities of Secure Shell (SSH) with the reliability, usability, and configurability of a proven Windows® terminal emulator.

Simple SSH VPN Host-to-host IP tunneling In SecureCRT: Open session options for a host

Simple SSH VPN (2) Now select the “Advanced” button

SSH – Port forwarding Open up the remote connection n Open browser or application to : – :8080 in our example n We should now connect to remote service

Simple SSH VPN

Not Just for Hosts Network to Network

VPN on Linux n VPN – HOWTO n Two Main Ingredients: –ssh/sshd – for privacy –pppd n The pppd commands establish a working connection. It's strictly a bilateral umbilical cord between the VPN servers that extends no mutual connectivity to workstations on the networks. n Mutual Connectivity between workstations: That is done by the route commands. Once these commands have been executed, the two networks have been transparently pooled into a single group of machines, all mutually visible via Internet addresses. n PPP Interface assigned an IP address

Example ssh tunnel here

An Interesting challenge VPN for VM Computing on Grids Goals –Security for the VPN  Via ssh –Static address for VMs undergoing migration –Different VMs may communicate with each other –Assume minimum co-operation from the remote host

Spawning Networks

Main idea: Automating the process of realizing distinct network architectures on demand OS Analogy : “We envision spawning networks as having the capability to spawn not processes but complex network architectures”

Spawning Networks Two child networks are spawned by the parent network. The first child network is a Cellular IP virtual network that supports wireless extensions to the parent network. The other child network supports a differentiated services architecture operating over the same network infrastructure. An additional level of nesting is shown where the Cellular IP network spawns a child network.

Spawning Networks

Genesis kernel has the capability to spawn child network architectures that can support alternative distributed network algos and services

Spawning Networks

Programmable data path Operate on the same physical node Each routelet corresponds to a distinict virtual network Network inheritance tree

Ports and engines are dynamically created during the spawning phase from a set of transport modules, which represent a set of generic routelet plugins Encapsulators, which add specific headers (e.g., RTP, IPv4) to packets at the end systems or routelets Forwarders, which execute particular packet forwarding mechanisms (e.g., IPv6, MPLS, Cellular IP) at routelets Classifiers, which separate packets in order to receive special treatment by routelets Processors, which process packets based on architecturally specific plugins (e.g., police, mark, monitor, shape, filter packets) Schedulers, which regulate the use of virtual link capacity based on a programmable buffer and queue management capability Child ports and engines can be constructed by directly