VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Internet Security CSCE 813 IPsec
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
NAT TRAVERSAL FOR IPSEC Research Seminar on Datacommunications Software HIIT
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
IPsec: Internet Protocol Security Chong, Luon, Prins, Trotter.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Virtual Private Network
Industrial Strength Security for an Insecure World
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
What Is Needed to Build a VPN? An existing network with servers and workstations Connection to the Internet VPN gateways (i.e., routers, PIX, ASA, VPN.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration VPNs.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
CSCE 715: Network Systems Security
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Information management 1 Groep T Leuven – Information department 1/26 IPSec IP Security (IPSec)
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
1 Virtual Private Networks (VPNs) and IP Security (IPSec) G53ACC Chris Greenhalgh.
IP Security: Security Across the Protocol Stack. IP Security There are some application specific security mechanisms –eg. S/MIME, PGP, Kerberos, SSL/HTTPS.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
IPSec VPN Chapter 13 of Malik. 2 Outline Types of IPsec VPNs IKE (or Internet Key Exchange) protocol.
Virtual Private Network (VPN)
V IRTUAL P RIVATE N ETWORKS K ARTHIK M OHANASUNDARAM W RIGHT S TATE U NIVERSITY.
Virtual Private Networks Manraj Sekhon. What is a VPN?
Security IPsec 1 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
IPSec  general IP Security mechanisms  provides  authentication  confidentiality  key management  Applications include Secure connectivity over.
IPSec – IP Security Protocol By Archis Raje. What is IPSec IP Security – set of extensions developed by IETF to provide privacy and authentication to.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Network Access for Remote Users Dr John S. Graham ULCC
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Network Layer Security Network Systems Security Mort Anvari.
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Virtual Private Network
CSCI 465 Data Communications and Networks Lecture 26
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Networks
Internet and Intranet Fundamentals
IPSec IPSec is communication security provided at the network layer.
Virtual Private Network (VPN)
Presentation transcript:

VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui

Virtual Private Network (VPN)  a private network constructed within a public network infrastructure, such as the global Internet  two categories of VPNs A remote access VPN enables remotely located employees to communicate with a central location. Site-to-site VPN interconnects two private networks via a public network such as the Internet

Protocols used by VPN Point-to-Point-Tunneling Protocol (PPTP)  simple VPN technology based on point-to-point protocol  supports multiple encapsulation, authentication, and encryption. Layer 2 Tunneling Protocol (L2TP)  combination of PPTP and Layer 2 Forwarding (L2F)  Two types of L2TP L2TP Access Concentrator (LAC) L2TP Network Server (LNS) Internet Protocol Security (IPSec)  framework for protecting the confidentiality and integrity of data in transit  A common use of IPSec is the construction of a VPN

IPSec Protocols  IPSec defines new set of headers to be added to IP datagrams  ESP - Confidentiality, data integrity, and data source authentication. (frc2406)  AH - Data integrity, source authentication (frc2402) IP HeaderESP HeaderProtected Data ESP Trailer IP HeaderAH HeaderProtected Data

IPSec Modes Transport Mode  Protect upper-layer protocol, endpints exposed  IPSec header insert between IP header and upper layer protocol header Tunnel Mode  Entire IP Packet is protected, become payload of new packet  IPSec header is inserted between the outer and inner IP header.  Used by gateway for VPN, perform encryption on behalf of host IPSec SA  Relationship between entities on how to communicate securely.  Unidirectional, two for each pair, one from A to B, and B to A  Identified by a SPI, destination addr, security protocol identifier

IPSec Phases SPD  Security Policy Database maintains IPSec Policy  Each entry defines the traffic to be protected, how to protect  Three actions on traffic match: discard, bypass and protect  IP traffic mapped to IPSec policy by selector IKE  Establish security parameters, authentication (SAs) between IPSec peers  IKE SAs defines the way in which two peers communicate, which algorithm to use to encrypt IKE traffic, how to authenticate the remote peers.  SPD instruct IKE what to establish, IKE establish IPSec SAs based on its own policy settings Phase 1 communication  Identify the peers.  Create IKE SAs by authentication and key exchange  One side offers a set of algorithm, other side accept or reject. Derive key material to use for IPSec with AH, ESP or both Phase 2 communication  IPSec SAs negotiations are under protection of IKE SAs created in phase 1  IPSec shared key derived by using Diffie-Hellman or refresh shared secret.

VPN Solutions  Access VPN offers remote access to a company’s Intranet or Extranet. Example: employees who are on business trip or in home office  Intranet VPN offers the Intranet connection. Example: Branch offices  Extranet VPN offers the Extranet connection. Example: Business partners, customers

VPN Solutions – Benefits Access VPN  Economical: Internet access Vs. long distance dialup  Secure Intranet VPN  Economical: ISP Vs. dedicated connection  Flexible: topological design, new office  Reliable: Redundant ISP  Secure Extranet VPN  Same as Intranet VPN  Management, Authentication and authorization

VPN Example

VPN Example - Extranet VPN

Conclusion  Cheaper and Secure, Go for it!

Q & A Any questions?