1 Network Security Revisited ITEC 370 George Vaughan Franklin University.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Guide to Network Defense and Countermeasures Second Edition
IUT– Network Security Course 1 Network Security Firewalls.
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Defining Network Infrastructure and Security
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Security Awareness Chapter 5 Wireless Network Security.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
COS 420 Day 18. Agenda Assignment 4 Posted Chap Due April 6 Group project program requirements Submitted but Needs lots of work Individual Project.
Security Awareness: Applying Practical Security in Your World, Second Edition Chapter 5 Network Security.
Security Awareness: Applying Practical Security in Your World
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
COS 420 Day 20. Agenda Group Project Discussion Protocol Definition Due April 12 Paperwork Due April 29 Assignment 3 Due Assignment 4 is posted Last Assignment.
Internet Protocol Security (IPSec)
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
NetComm Wireless VPN Functionality Feature Spotlight.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
1 Subnetting ITEC 370 George Vaughan Franklin University.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Network Components: Assignment Three
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration VPNs.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
NETWORKING COMPONENTS AN OVERVIEW OF COMMONLY USED HARDWARE Christopher Johnson LTEC 4550.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
ITEC 370 George Vaughan Franklin University
TCP/IP Protocols Contains Five Layers
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
The University of Oklahoma Virtual Private Network How it works.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1 Week #5 Routing and NAT Network Overview Configuring Routing Configuring Network Address Translation Troubleshooting Routing and Remote Access.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
Securing Access to Data Using IPsec Josh Jones Cosc352.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Defining Network Infrastructure and Network Security Lesson 8.
Virtual Private Network
Virtual Private Networks
Virtual Private Networks
Instructor Materials Chapter 6 Building a Home Network
Chapter 12 Communications Security & Countermeasures
Firewalls Routers, Switches, Hubs VPNs
Introduction to Network Security
Cengage Learning: Computer Networking from LANs to WANs
Presentation transcript:

1 Network Security Revisited ITEC 370 George Vaughan Franklin University

2 Sources for Slides Material in these slides comes primarily from course text, Guide to Networking Essentials,Tomsho, Tittel, Johnson (2007). Other sources are cited in line and listed in reference section.

3 TCP/IP and OSI Models

4 VPN Wikipedia-VPN VPN – Virtual Private Network A virtual (logical) private network running on top of a public network (e.g. Internet). Useful for providing remote access without using dedicated lines. 2 parts: –‘inside’ network which is trusted –‘outside’ part which is not trusted. VPN Server manages authentication When active, all access from client to outside must pass through a firewall – makes client act as if it was in the ‘inside’ network.

5 VPN Advantages and Disadvantages Tomsho, Tittel, Johnson (2007) Advantages: –Significantly cheaper than leasing private lines. –Usable almost anywhere in the world. Disadvantages –Security risk if not properly configured –May be slower than leased lines (but often ‘fast enough’)

6 Transmission Using Leased Line Switch/ Router 1 (R1) Machine 1 (M1) LAN 1 Switch/ Router 2 (R2) Machine 2 (M2) LAN 2 WAN – Leased Line ($) IP Header Dest=M2 DataIP Header Dest=M2 DataIP Header Dest=M2 Data Trusted Area

7 Terminology Encapsulation: –Act of placing a packet (header and data) inside the data section of another packet. –Similar to placing an envelope containing a letter inside another envelope (which may have a different address). –sometimes the encapsulating packet is of a different protocol. Encryption: –The process of obscuring information Tunneling (Tunneling, 2005.): –Also known as "port forwarding" –the transmission of data intended for use only within a private network through a public network in such a way that the routing nodes in the public network are unaware that the transmission is part of a private network.

8 Transmission Using VPN on Public Network Switch/ Router 1 (R1) Machine 1 (M1) VPN Client LAN 1 LAN 2 Switch/ Router 2 (R2) Machine 2 (M2) IP Header Dest=VPN1 Data IP Header Dest=M2 Data Public Internet Machine 1 encapsulates and encrypts original packet and wraps inside new packet with destination = VPN1 IP Header Dest=VPN1 Data IP Header Dest=M2 Data IP Header Dest=M2 DataIP Header Dest=M2 Data VPN Server (VPN1) VPN Server/Firewall De-encapsulates and decrypts original packet and sets destination = M2 Trusted Area Tunnel

9 Examples of VPN Tunneling Protocols IPSec –IP Security PPTP –Point-to-Point Tunneling Protocol L2TP –Layer 2 Tunneling Protocol

10 IPSec Wikipedia-IPSec (n.d). IP Security A set of protocols operating at the Network layer (layer 3). Often used for LAN-to-LAN VPNs 2 Modes –Transport Mode: Only payload in packet is encrypted (header is not) Host to Host communication –Tunnel Mode: Entire IP packet is encrypted, including header Encapsulated in another packet for routing across internet. Network to Network communication Optional in IPv4, obligatory in IPv6

11 PPTP Wikipedia-PPTP (n.d). Often used for Client-to-LAN VPNs. Establishes a regular PPP session with peer –Uses Generic Routing Encapsulation protocol (GRE) Establishes a second TCP session which is used to manage the GRE session First implemented by Cisco an later licensed to Microsoft. Easy to configure. First VPN protocol supported by Microsoft Dial- up Networking.

12 L2TP Often used for Client-to-LAN VPNs. An extension of PPTP (Microsoft) and LTF (Cisco). Developed by Cisco Doesn’t require registered IP addresses Does not contain encryption. Often used in conjunction with IPSec.

13 Protecting Networks with Firewalls Tomsho, Tittel, Johnson (2007) Firewall: HW device or SW program that inspects packets going into or out of a network or computer, and then discards/forwards them based on rules –Protects against outside attempts to access unauthorized resources, and against malicious network packets intended to disable or cripple a corporate network and its resources –If placed between Internet and corporate network, can restrict users’ access to Internet resources Firewalls can attempt to determine the context of a packet (stateful packet inspection (SPI))

14 Types of Firewalls Wikipedia-firewall (n.d.) Packet Filter Firewall: –Stateless –Rules are static Circuit Level Firewall: –Stateful –Can determine if packet is a new or part of an existing connection. Application Layer Firewall: –Also known as proxy based firewalls

15 Using a Router as a Firewall Tomsho, Tittel, Johnson (2007) A firewall is just a router with specialized SW that facilitates creating rules to permit or deny packets Many routers have capabilities similar to firewalls –After a router is configured, by default, all packets are permitted both into and out of the network –Network administrator must create rules (access control lists) that deny certain types of packets Typically, an administrator builds access control lists so that all packets are denied, and then creates rules that make exceptions

16 NAT Wikipedia-NAT (n.d.) Network Address Translation (IP-masquerading) Router/Firewall replaces internal IP source address in IP packet with its own IP address when sending packets out. Router/Firewall reverses process for incoming packets. Useful for hiding the Identify of real IP addresses behind the firewall Can be used for IP address reuse –multiple machines share same IP address –Common in home routers –ISP assigns single public IP address –Router maps to multiple private IP addresses

17 PAT Wikipedia-NAT (n.d.) A variation of NAT is PAT (Port address translation) Port addresses can be used for multiplexing Using ports, a single external IP address can map up to 65,000 internal network addresses (as big as a class B network)

18 Using Network Address Translation to Improve Security Tomsho, Tittel, Johnson (2007) A benefit of NAT is that the real address of an internal network resource is hidden and inaccessible to the outside world –Because most networks use NAT with private IP addresses, those devices configured with private addresses can’t be accessed directly from outside the network –An external device can’t initiate a network conversation with an internal device, thus limiting an attacker’s options to cause mischief

19 Implementing Wireless Security Tomsho, Tittel, Johnson (2007), Wikipedia Attackers who drive around looking for wireless LANs to intercept are called wardrivers Wireless security methods –SSID (not easy to guess and not broadcast) Service Set Identifier – identifies network –Wired Equivalency Protocol (WEP) 1999 – Can be cracked in 2 minutes w available software –Wi-Fi Protected Access (WPA) 2003 – Stronger than WEP. Not supported by all access points. –802.11i 2004 – same as WPA2, superset of WPA. –MAC address filtering Access control list based on MAC address You should also set policies: limit AP signal access, change encryption key regularly, etc.

20 References Tomsho, Tittel, Johnson (2007). Guide to Networking Essentials. Boston: Thompson Course Technology. Odom, Knott (2006). Networking Basics: CCNA 1 Companion Guide. Indianapolis: Cisco Press Tunneling (2005). Tunniling. Retreived 03/26/2007 from Wikipedia (n.d.). OSI Model. Retrieved 09/12/2006 from Wikipedia-IPSec (n.d). IPsec. Retrieved 01/30/2007 from: Wikipedia-VPN (n.d.). Virtual Private Network. Retrieved 01/30/2007 from: Wikipedia-firewall (n.d.) Firewall (Networking). Retrieved 01/30/2007 from: Wikipedia-NAT (n.d.) Network Address Translation. Retrieved 01/30/2007 from: