Scenario & Hands-on 7-1 VPN Configuration-PPTP

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

DSL-2730B, DSL-2740B, DSL-2750B.
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
XP Road Warrior Connection By: Darren Critchley. What is Road Warrior? Remote client such as a salesperson who needs to connect to the main office LAN.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
2008 NetDefend Firewall Series Technical Training Firewall Fundamental - Part 2 ©Copyright All rights reserved.
Module 5: Configuring Access for Remote Clients and Networks.
Allied Telesyn Wireless LAN Solutions AT-WL2411 Access Point AT-WR2411 Wireless LAN PCMCIA Card.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Module 10: Configuring Virtual Private Network Access for Remote Clients and Networks.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Hardware Firewalls: Advanced Feature © N. Ganesan, Ph.D.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 14: Troubleshooting Remote Connections.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Implementing Secure Converged Wide Area Networks (ISCW)
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
DVG-N5402SP.
DHP-306AV & DHP-W306AV. Agenda: How to change Encryption on a DHP-306AV How to change the Device Password on a DHP-306AV What will happen if the Device.
1. A router is a device in computer networking that forwards data packets to their destinations, based on their addresses. The work a router does it called.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
1 The VPN Menu. 2 The VPN Menu VPN The GD eSeries can be set up either as an OpenVPN server or as a client, and even play both roles at the same time,
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
NetComm Wireless VPN Functionality Feature Spotlight.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
© 2012 Cisco and/or its affiliates. All rights reserved. 1 CCNA Security 1.1 Instructional Resource Chapter 10 – Implementing the Cisco Adaptive Security.
DrayTek VPN Solution. Outline What is VPN What does VPN Do Supported VPN Protocol How Many Tunnels does Vigor Support VPN Application Special VPN Application.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
4-1 PSe_4Konf.503 EAGLE Getting Started and Configuration.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
How to setup VRT- 402N with MH-2001?. Outline  Connections Topology  VRT-402N setup  MH-2001 setup.
Worldwide Product Marketing Group United States - Spain - UK - France - Germany - Singapore - Taipei Barricade™ VPN Broadband Routers (4 and 8 port)
Windows Server 2008 Chapter 9 Last Update
How to setup VRT- 402N with VRT-401/311S?. Outline  Connections Topology  VRT-402N setup  VRT-401 setup.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
D-Link Security 1 Internal LAN1 IP: /24 Internal LAN2 IP: /24 Internal LAN3 IP: /24 WAN1 IP: /24 FTP Server.
Basic Configuration-Modify LAN IP address for DFL Firewall
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod9_L8 1 Network Security 2 Module 6 – Configure Remote Access VPN.
70-411: Administering Windows Server 2012
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
Wireless Networks and the NetSentron By: Darren Critchley.
Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions.
Code : STM#530 Samsung Electronics Co., Ltd. OfficeServ7400 Security Introduction Distribution EnglishED01.
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
Generic Routing Encapsulation GRE  GRE is an OSI Layer 3 tunneling protocol: Encapsulates a wide variety of protocol packet types inside.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Routing with Windows Server 2003 Chapter 9. Objectives for this Chapter Manage Routing And Remote Access routing interfaces Manage packet filters Manage.
Using Routing and Remote Access Chapter Five. Exam Objectives in this Chapter:  Plan a routing strategy Identify routing protocols to use in a specified.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
© 2004, Cisco Systems, Inc. All rights reserved. CSPFA 3.2—16-1 Lesson 16 Easy VPN Remote—Small Office/Home Office.
Configure and Security Remote Acess. Chapter 8 Advance Computer Network Lecture Sorn Pisey
D-Link TSD 2008 workshop 1 Policy Based Route & User Authentication.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Windows Vista Configuration MCTS : Advanced Networking.
Virtual Private Network Access for Remote Networks
Agenda Create certificates for the GlobalProtect Portal, internal gateway, and external gateway. Attach certificates to a SSL-TLS Service Profile. Configure.
Presentation transcript:

Scenario & Hands-on 7-1 VPN Configuration-PPTP 2 3 4 5 6 Create object for PPTP server IP address and IP address range Click “Address” in Objects Key in the correspond IP address

Scenario & Hands-on 7-1 VPN Configuration-PPTP 2 3 4 5 6 Create Local Database for PPTP authentication Click “Local User Databases ” in User Authentication Key in the correct Username and Password

Scenario & Hands-on 7-1 VPN Configuration-PPTP Create PPTP tunnel 2 3 4 5 6 Create PPTP tunnel Click “PPTP/L2TP Servers ” in Interface Choose the correspond configuration

Scenario & Hands-on 7-1 VPN Configuration-PPTP 2 3 4 5 6 Create User Authentication Rules for PPTP tunnel Click “User Authentication Rules ” in User Authentication Choose the correspond configuration Enable Log setting and choose local user database

Scenario & Hands-on 7-1 VPN Configuration-PPTP 2 3 4 5 6 Create IP Rules for PPTP tunnel Click “IP Rules ” in Rules Choose the correspond configuration Enable Log setting

Scenario & Hands-on 7-1 VPN Configuration-PPTP 2 3 4 5 6 After all configuration, Click “configuration” on main menu bar Click “Save and Activate”

Scenario & Hands-on 7-1 VPN Configuration-PPTP Testing Result

Scenario & Hands-on 7-1 Exercise 7-1- VPN Configuration-PPTP PPTP Client VPN Tunnel WAN1 DHCP IP Objectives: Use Windows client to Dial-up PPTP Ping the IP address of LAN in firewall DFL-1600 M: explain how to set pptp client on windows Internal LAN3 IP: 192.168.3.0/24 Internal LAN1 IP: 192.168.1.0/24 Internal LAN2 IP: 192.168.2.0/24

Scenario & Hands-on 7-2 VPN Configuration-L2TP/IPsec Network topology L2TP/IPsec Client VPN Tunnel WAN1 DHCP Note: L2TP/IPsec must use transport mode Choose correct local net and remote net for IPsec tunnel Choose correct inner IP address and Outer Interface filter for L2TP tunnel DFL-1600 Internal LAN3 IP: 192.168.3.0/24 Internal LAN1 IP: 192.168.1.0/24 Internal LAN2 IP: 192.168.2.0/24

The logic of configuration Scenario & Hands-on 7-2 VPN Configuration-IPsec Objectives The user dial-up to firewall by Windows L2TP/IPsec client software Dial-up user communicate with LAN1 of firewall The logic of configuration Create objects for L2TP server IP address and IP address range Create Authenticating database Configure IPsec tunnel Configure L2TP server Create the IP rule for L2TP tunnel

Scenario & Hands-on 7-2 VPN Configuration-L2TP/IPsec 1 2 3 4 5 6 7 8 9 10 11 Create objects for L2TP server IP address and IP address range Click “Address” in Objects Key in the correspond IP address

Scenario & Hands-on 7-2 VPN Configuration-L2TP/IPsec 1 2 3 4 5 6 7 8 9 10 11 Create Local Database for L2TP authentication Click “Local User Databases ” in User Authentication Key in correct Username and Password

Scenario & Hands-on 7-2 VPN Configuration-L2TP/IPsec 1 2 3 4 5 6 7 8 9 10 11 Create the pre-shared key for L2TP Click “Pre-Share Keys ” in VPN Objects Key in the correspond value

Scenario & Hands-on 7-2 VPN Configuration-L2TP/IPsec 1 2 3 4 5 6 7 8 9 10 11 Create the IPsec tunnel Click “IPsec Tunnels” in Interface Choose correspond configuration

Scenario & Hands-on 7-2 VPN Configuration-L2TP/IPsec 1 2 3 4 5 6 7 8 9 10 11 Verify the IPsec tunnel Click “Authentication” in this IPsec tunnel Apply pre-shared key to this IPsec tunnel

Scenario & Hands-on 7-2 VPN Configuration-L2TP/IPsec 1 2 3 4 5 6 7 8 9 10 11 Verify the IPsec tunnel Click “Routing” in this IPsec tunnel Enable “Dynamically add routes to remote network when a tunnel is established “in this IPsec tunnel

Scenario & Hands-on 7-2 VPN Configuration-L2TP/IPsec 1 2 3 4 5 6 7 8 9 10 11 Verify the IPsec tunnel Click “Advanced” in this IPsec tunnel Disable “Add route for remote network “in this IPsec tunnel

Scenario & Hands-on 7-2 VPN Configuration-L2TP/IPsec 1 2 3 4 5 6 7 8 9 10 11 Create the L2TP tunnel Click “PPTP/L2TP Servers ” in Interface Choose correspond configuration

Scenario & Hands-on 7-2 VPN Configuration-L2TP/IPsec 1 2 3 4 5 6 7 8 9 10 11 Create User Authentication Rules for L2TP tunnel Click “User Authentication Rules ” in User Authentication Choose correspond configuration Enable Log setting and choose local user database

Scenario & Hands-on 7-2 VPN Configuration-L2TP/IPsec 1 2 3 4 5 6 7 8 9 10 11 Create IP Rules for L2TP tunnel Click “IP Rules” in Rules Choose correspond configuration Enable Log setting

Scenario & Hands-on 7-2 VPN Configuration-L2TP/IPsec 1 2 3 4 5 6 7 8 9 10 11 After all configuration , Click “configuration” on main menu bar Click “Save and Activate”

Scenario & Hands-on 7-2 VPN Configuration-L2TP/IPsec Testing Result

Scenario & Hands-on 7-2 Exercise 7-2- VPN Configuration-L2TP/IPsec L2TP/IPsec Client VPN Tunnel WAN1 DHCP IP Objectives: The user dial-up to firewall by Windows L2TP/IPsec client software Ping the IP address of LAN in firewall DFL-1600 Internal LAN3 IP: 192.168.3.0/24 Internal LAN1 IP: 192.168.1.0/24 Internal LAN2 IP: 192.168.2.0/24

VPN Objects – Pre Shared Keys Scenario & Hands-on 7-3 VPN Configuration- IPsec VPN Objects – Pre Shared Keys For users to authenticate VPN tunnels 2 types of method to enter PSK – ASCII and HEX ASCII – type in passphrase HEX – type in passphrase and use “generate” to cipher passphrase

Scenario & Hands-on 7-3 VPN Configuration- IPsec VPN Objects – LDAP For secured authentication to established over VPN, CA need to be downloaded to LDAP Server

Scenario & Hands-on 7-3 VPN Configuration- IPsec ID Lists The Concept of ID Lists is to manage and control accessibility of the VPN clients and gateways Mobile clients can be restricted from accessing Internal networks by ID Lists

Scenario & Hands-on 7-3 VPN Configuration- IPsec IKE/IPsec Algorithms Predefined IKE & IPSec Algorithms by default High – Very Secured Medium – Secured You can defined your own algorithms

Scenario & Hands-on 7-3 VPN Configuration- IPsec Network topology DFL-1600 WAN1 IP: 192.168.174.71/24 Remote LAN Internal LAN IP: 192.168.10.0/24 VPN Tunnel WAN1 Static IP: 192.168.174.70/24 Note: Use same pre-share key and algorithm between two IPsec settings Choose correct local net and remote net for IPsec tunnel DFL-1600 Internal LAN3 IP: 192.168.3.0/24 Internal LAN1 IP: 192.168.1.0/24 Internal LAN2 IP: 192.168.2.0/24

The logic of configuration Scenario & Hands-on 7-3 VPN Configuration-IPsec Objectives Two firewalls communicate to each other by IPsec tunnel . The client of local-net ping to the client of remote-net The logic of configuration Create VPN Object( pre-shared key) Configure IPsec tunnel Create the IP rule for IPsec tunnel

Scenario & Hands-on 7-3 VPN Configuration- IPsec 1 2 3 4 5 6 Create objects for IP address of remote IP address and network Click “Address” in Objects Key in the correspond IP address

Scenario & Hands-on 7-3 VPN Configuration- IPsec 1 2 3 4 5 6 Create the pre-shared key for IPsec tunnel Click “Pre-Share Keys ” in VPN Objects Key in the correct value

Scenario & Hands-on 7-3 VPN Configuration- IPsec 1 2 3 4 5 6 Create the IPsec tunnel Click “IPsec Tunnels” in Interface Choose the correspond configuration

Scenario & Hands-on 7-3 VPN Configuration- IPsec 1 2 3 4 5 6 Combine two interfaces to one interface group Click “Interface Groups” in this Interface Choose the correspond interfaces

Scenario & Hands-on 7-3 VPN Configuration- IPsec 1 2 3 4 5 6 Create IP Rules for L2TP tunnel Click “IP Rules” in Rules Choose correspond configuration Enable Log setting

Scenario & Hands-on 7-3 VPN Configuration- IPsec 1 2 3 4 5 6 After all configuration , Click “configuration” on main menu bar Click “Save and Activate”

Scenario & Hands-on 7-3 Exercise 7-3- VPN Configuration-IPsec Odd group DFL-1600 Remote LAN Internal LAN VPN Tunnel Even group DFL-1600 Objectives: Two firewalls communicate to each other by IPsec tunnel The client of local-net ping to the client of remote-net Internal LAN1

Scenario & Hands-on 7-4 VPN Configuration- IPsec with NetScreen 204 Network topology NetScreen 204 WAN1 IP: 192.168.174.71/24 Remote LAN Internal LAN IP: 192.168.10.0/24 VPN Tunnel WAN1 Static IP: 192.168.174.70/24 Note: Use same pre-share key and algorithm between two DFL-1600 and NS-204 Choose correct local net and remote net for IPsec tunnel DFL-1600 Internal LAN3 IP: 192.168.3.0/24 Internal LAN1 IP: 192.168.1.0/24 Internal LAN2 IP: 192.168.2.0/24

The logic of configuration Scenario & Hands-on 7-4 VPN Configuration- NetScreen 204 Objectives Two firewalls communicate to each other by IPsec tunnel . The client of local-net ping to the client of remote-net The logic of configuration Create VPN Object( pre-shared key, remote net/gateway and algorithm ) Configure IPsec tunnel Create the IP rule for IPsec tunnel