Network Security Philadelphia UniversitylAhmad Al-Ghoul 2010-20111 Module 12 Module 12 Virtual Private Networks  MModified by :Ahmad Al Ghoul  PPhiladelphia.

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
IPsec: Internet Protocol Security Chong, Luon, Prins, Trotter.
Network Security Philadelphia UniversityAhmad Al-Ghoul Module 11 Exploring Secure Topologies  MModified by :Ahmad Al Ghoul  PPhiladelphia.
Virtual Private Networks and IPSec
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
1 Pertemuan 11 IPSec dan SSL Matakuliah: H0242 / Keamanan Jaringan Tahun: 2006 Versi: 1.
Chapter 10 Virtual Private Networks. VPN Defined  A segment of the public network made to appear part of a private network so that it can be used to.
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
VPN – Virtual Private Networking. VPN A Virtual Private Network (VPN) connects the components of one network over another network. VPNs accomplish this.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
Virtual Private Network
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
What Is Needed to Build a VPN? An existing network with servers and workstations Connection to the Internet VPN gateways (i.e., routers, PIX, ASA, VPN.
1. Collision domains are unsecure 2. The employees often need to remote access to corporate network resources  The Internet traffic is much more vulnerable.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration VPNs.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
Chapter ADCS CS262/0602/V2 Chapter 9 VIRTUAL PRIVATE NETWORK (VPN) "Success is the prize for those who stand true to their ideas!" -- Josh S. Hinds.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
IPSec IPSec provides the capability to secure communications across a LAN, across private and public wide area networks (WANs) and across the Internet.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Karlstad University IP security Ge Zhang
Virtual Private Networks (VPNs) Source: VPN Technologies: Definitions and Requirements. VPN Consortium, July 2008.VPN Technologies: Definitions and Requirements.
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
Virtual Private Network Chapter 4. Lecturer : Trần Thị Ngọc Hoa2 Objectives  VPN Overview  Tunneling Protocol  Deployment models  Lab Demo.
V IRTUAL P RIVATE N ETWORKS K ARTHIK M OHANASUNDARAM W RIGHT S TATE U NIVERSITY.
Network Access for Remote Users Dr John S. Graham ULCC
K. Salah1 Security Protocols in the Internet IPSec.
Virtuelne Privatne Mreže 1 Dr Milan Marković. VPN implementations  In the following sections we will discuss these popular VPN implementation methods,
Securing Access to Data Using IPsec Josh Jones Cosc352.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Network
Virtual Private Networks and IPSec
Virtual Private Networks
IPSec Detailed Description and VPN
Virtual Private Networks
Virtual Private Network (VPN)
Chapter 18 IP Security  IP Security (IPSec)
Virtual Private Network (VPN)
Virtual Private Network zswu
Presentation transcript:

Network Security Philadelphia UniversitylAhmad Al-Ghoul Module 12 Module 12 Virtual Private Networks  MModified by :Ahmad Al Ghoul  PPhiladelphia University  FFaculty Of Administrative & Financial Sciences  BBusiness Networking & System Management Department  RRoom Number  E Address:

Network Security Philadelphia UniversitylAhmad Al-Ghoul Contents  Relation to SSL & SSH  Virtual Private Network  Three Types of VPNs  The Concept of Tunneling  General IPTunneling  Look at the stack  GRE & PPTP  Generic Routing Encapsulation  PPTP  Ipsec  Encapsulating Security Payload

Network Security Philadelphia UniversitylAhmad Al-Ghoul Relation to SSL & SSH  Recall SSL is the secure socket layer –It provides an encrypted and authenticated TCP connection between a client and a server. –It does not hide your network because you still use standard IP visible to all.

Network Security Philadelphia UniversitylAhmad Al-Ghoul Virtual Private Network  Why? –Institutions are distribted –They need to protect themselves –Old Days Buy your own phone lines and build a physically private network. –VPN Use the internet as a “carrier” of your private traffic.

Network Security Philadelphia UniversitylAhmad Al-Ghoul Three Types of VPNs  Remote access –A company uses a dial-up system to allow remote workers to connect and establish secure connections to the company network  Site-to-site –Intranet Connect two different, but remote LANS to form a single network –Extranet Two different companies want to establish a private connection

Network Security Philadelphia UniversitylAhmad Al-Ghoul Reasons and Requirements  Typical Reasons for wanting a VPN –Extend geographic connectivity –Improve security –Reduce operational costs versus traditional WAN –Improve productivity –Simplify network topology –Provide global networking opportunities –Provide telecommuter support  Requirements for a Good VPN –Security –Reliability –Scalability –Network management –Policy management

Network Security Philadelphia UniversitylAhmad Al-Ghoul The Concept of Tunneling  tunneling - the process of placing an entire packet within another packet and sending it over a network.  Tunneling requires three different protocols: –Carrier protocol: The protocol used by the network that the information is traveling over –Encapsulating protocol: The protocol (GRE, IPSec, L2F, PPTP, L2TP) that is wrapped around the original data –Passenger protocol: The original data (IPX, NetBeui, IP) being carried

Network Security Philadelphia UniversitylAhmad Al-Ghoul Tunneling  Key idea: allow packets to move from one point to another point without being directly touched by internet routers 1. Passenger packet goes to gateway 3. Internet (carrier protocol) 2. Gateway wraps passenger with Encapsulation protocol 4. Passenger unwrapped and sent on its way

Network Security Philadelphia UniversitylAhmad Al-Ghoul General IPTunneling R1 Internet R1 Network 1 Network 2 Host Host To: From: IP payload To: From: IP payload To: From: IP payload To: From: IP Payload

Network Security Philadelphia UniversitylAhmad Al-Ghoul Look at the stack  Tunneling can layer a complete stack and address space on top of the existing one! –Almost exactly what we did with our XKernel which was tunneled over the regular IP stack. –For Site-to-Site use Generic Routing Encapsulation (GRE) IPsec –For remote access PPTP (point-to-point tunneling protocol) L2TP (layer 2 tunneling protocol) Ethernet or PPP or … IP GRE encrypt IP TCP application IPsec

Network Security Philadelphia UniversitylAhmad Al-Ghoul GRE & PPTP  GRE –Very simple encapsulation frame that tells you what type of thing is encapsulated, a sequence number and an ack number.  PPTP –Protocol that allows PPP packets to be encapsulated within Internet Protocol (IP) packets and forwarded over any IP network, including the Internet itself.

Network Security Philadelphia UniversitylAhmad Al-Ghoul Generic Routing Encapsulation  Runs over IP at port 47.  It is a protocol for wrapping other protocols. Protocol Family protocol type Reserved 0000 SNA 0004 OSI network layer 00FE XNS 0600 IP 0800 Chaos 0804 Frame Relay ARP 0808 VINES 0BAD DECnet (Phase IV) 6003 Transparent Ethernet Bridging 6558 Raw Frame Relay 6559 Apollo Domain 8019 Ethertalk (Appletalk) 809B Novell IPX 8137 RFC 1144 TCP/IP compression 876B IP Autonomous Systems 876C protocol checksumoffset key Sequence number Routing information data

Network Security Philadelphia UniversitylAhmad Al-Ghoul PPTP  For a dial-up client –First establish a PPP connection to the server –Set up a TCP connection on port 1723 for control messages Session management command-replies Handles calls and keep-alive messages –Over the PPP one runs IP and TCP.  In other cases use existing IP level.

Network Security Philadelphia UniversitylAhmad Al-Ghoul PPTP data packets  The carrier network delivers GRE packets –Sliding window used to provide flow control  GRE packet contains a PPP packet.  PPP has an encryption protocol that is used to encrypt the contents of each frame.  The content frame is the tunneled IP packet. Carrier IP packet GRE packet PPP packet IP packet

Network Security Philadelphia UniversitylAhmad Al-Ghoul IPsec  A General Framework for IP security –NOTE: SSL is at the TCP level –IPSec is designed to be at the IP level  Two Components –Two protocols for security A header for authentication (AH) A header for secure encapsulation (ESP) –Internet Security Assoc. and Key Mgmt Protocl  A Security Association (SA) is a one way connection between two hosts/routers that is based on a choice of AH/ESP and Key protocol.

Network Security Philadelphia UniversitylAhmad Al-Ghoul IPSec Authentication NextHdrPayload lengthreserved SPI ( security paramenter index – identifies the sec. Assoc.) Sequence no Authentication Data

Network Security Philadelphia UniversitylAhmad Al-Ghoul IPSec Authentication NOTE: The authentication data is the cryptographic signature of this packet. It is not authentication of source identity  NextHdr is a pointer to the end of this packet.  SPI is an identifier which in combination with the IP address of the packet completely identifies the secruity association.  Sequence number prevents “replay attacks”

Network Security Philadelphia UniversitylAhmad Al-Ghoul Encapsulating Security Payload  This follows IP header (both v4 and v6) and before the encripted payload. –The payload data is often part of an “initialization vector” for the encrypted payload that follows  provides –confidentiality (encryption), data origin authentication, integrity, optional anti-replay service NextHdrPad length SPI ( security paramenter index – identifies the sec. Assoc.) Sequence no Authentication Data Up to 256 bytes of Playload data (Initialization Vector)