Guide to Firewalls and VPNs, 3 rd Edition Chapter Ten Setting Up A Virtual Private Network.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Internet Protocol Security (IP Sec)
Guide to Network Defense and Countermeasures Second Edition
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
11 Setting Up a Virtual Private Network
Module 5: Configuring Access for Remote Clients and Networks.
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Guide to Network Defense and Countermeasures Second Edition
Virtual Private Networks and IPSec
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Internet Protocol Security (IPSec)
Chapter 20: Network Security Business Data Communications, 4e.
Remote Networking Architectures
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Virtual Private Network
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Securing Site-to-Site Connectivity Connecting Networks.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
1 Guide to Network Defense and Countermeasures Chapter 7.
Chapter 11: Setting up a Virtual Private Network.
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Virtual Private Networks (VPNs) Source: VPN Technologies: Definitions and Requirements. VPN Consortium, July 2008.VPN Technologies: Definitions and Requirements.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
Guide to Network Security First Edition Chapter Five Network Authentication and Remote Access Using VPN.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
Guide to Network Defense and Countermeasures Third Edition
Securing Access to Data Using IPsec Josh Jones Cosc352.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Virtual Private Networks and IPSec
Virtual Private Networks
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network
Firewalls Routers, Switches, Hubs VPNs
VPN: Virtual Private Network
Cengage Learning: Computer Networking from LANs to WANs
Topic 12: Virtual Private Networks
Presentation transcript:

Guide to Firewalls and VPNs, 3 rd Edition Chapter Ten Setting Up A Virtual Private Network

Guide to Firewalls and VPNs, 3 rd Edition Overview Explain the components and essential operations of virtual private networks (VPNs) Describe the different types of VPNs Discuss VPN setups, such as mesh or hub-and- spoke configurations Select the right VPN tunneling protocol for a specific user need Define the process of setting up secure remote access for individual users via a VPN 2

Guide to Firewalls and VPNs, 3 rd Edition Overview (cont’d.) Discuss best practices for effective configuration and maintenance of VPNs 3

Guide to Firewalls and VPNs, 3 rd Edition Introduction Private leased lines –Give the user dedicated use of a predefined bandwidth or data rate –Often used to connect remote users or branch offices to a central administrative site –Don’t scale well VPNs –Function like private leased lines –Provide a means of secure point-to-point communications over the public Internet 4

Guide to Firewalls and VPNs, 3 rd Edition VPN Components and Operations Many telecommunications companies provide VPN services Can be set up with special hardware or with firewall software that includes VPN functionality –Many firewalls have VPN systems built into them Goal of a VPN –Provide a cost-effective and secure way to connect business locations to one another and connect remote workers to office networks 5

Guide to Firewalls and VPNs, 3 rd Edition VPN Components Endpoints –Hardware and/or software components that perform encryption and encapsulation, VPN connection –Occurs within the context of a TCP/IP tunnel Tunnel –Channel or pathway over a packet network used by the VPN –Runs through the Internet from one endpoint to another –Not a physical connection 6

Guide to Firewalls and VPNs, 3 rd Edition VPN Components (cont’d.) Virtual tunnel –Communications path that makes use of Internet- based hosts and servers to conduct data from one network station to another Figure 10-2 –Illustrates that VPNs in fact traverse the public Internet and must therefore handle the Internet’s protocols and procedures 7

Guide to Firewalls and VPNs, 3 rd Edition8 Figure 10-2 Model Cengage Learning 2012

Guide to Firewalls and VPNs, 3 rd Edition VPN Components (cont’d.) Devices that form the endpoints of the VPN: –Server running VPN protocols –VPN appliance –Firewall/VPN combination –Router-based VPN Certificate servers –Manage certificates if that is required Client computers –Run VPN client software 9

Guide to Firewalls and VPNs, 3 rd Edition Essential Activities of VPNs IP encapsulation Data payload encryption Encrypted authentication 10

Guide to Firewalls and VPNs, 3 rd Edition IP Encapsulation Hides the source and destination information of the encapsulated packets Encapsulating packet –Uses the source and destination addresses of the VPN gateway Encapsulated packet –Source and destination IP addresses can be in the private reserved blocks –Not usually routable over the Internet 11

Guide to Firewalls and VPNs, 3 rd Edition Data Payload Encryption Encryption accomplished using: –Transport mode –Tunnel mode Level of encryption varies –Higher the number of data bits used to generate keys, the stronger the encryption 12

Guide to Firewalls and VPNs, 3 rd Edition Encrypted Authentication Encryption domain –Everything in the protected network and behind the gateway Authentication –Hosts in the network need to know that originating host is an approved user of the VPN –Exchange of long blocks of code, called keys Generated by complex formulas called algorithms 13

Guide to Firewalls and VPNs, 3 rd Edition Benefits and Drawbacks of VPNs Benefits –Secure networking without the expense of establishing and maintaining leased lines –Allow the packet encryption/translation overhead to be done on dedicated systems –Provide control of physical setup 14

Guide to Firewalls and VPNs, 3 rd Edition Benefits and Drawbacks of VPNs (cont’d.) Drawbacks –Complex –If configured improperly, can create significant network vulnerabilities –Make use of the unpredictable and often unreliable Internet –Can expose inner workings of network If misconfigured 15

Guide to Firewalls and VPNs, 3 rd Edition VPNs Extend Network Boundaries VPN users will have a high-speed connection that is always on –Can be connected to network around the clock Guidelines for “always-on” users –Use two or more authentication tools to identify remote user –Integrate virus protection –Use Network Access Control (NAC) –Set usage limits 16

Guide to Firewalls and VPNs, 3 rd Edition Types of VPNs Site-to-site VPN –Links two or more networks Client-to-site –Makes a network accessible to remote users Options for configuring VPNs: –Hardware systems, software systems, and systems that combine hardware and software 17

Guide to Firewalls and VPNs, 3 rd Edition VPN Appliances General-purpose hardware device –Such as a router –Configure to use IPSec or another VPN protocol Obtain a VPN appliance –Hardware device specially designed to serve as the endpoint for one or more VPNs 18

Guide to Firewalls and VPNs, 3 rd Edition VPN Appliances (cont’d.) 19 Figure 10-4 Hardware Cengage Learning 2012

Guide to Firewalls and VPNs, 3 rd Edition Software VPN Systems Less expensive than hardware systems Tend to scale better on fast-growing networks Use policy manager systems –For enterprise-wide software distribution, policy creation, and management Allows multiple configuration profiles for end users SSL-based VPNs –Use the SSL protocol instead of IPSec –Only allow access to Web-enabled applications 20

Guide to Firewalls and VPNs, 3 rd Edition VPN Combinations of Hardware and Software Implement a VPN appliance at the central network –Use client software at the remote end of each VPN connection Client mode –Concentrator acts as a software client Network extension mode –Concentrator acts as a hardware device –Enables a secure site-to-site VPN connection 21

Guide to Firewalls and VPNs, 3 rd Edition Mixed Vendor VPNs Might have different vendors for: –Certificates –Client software –VPN termination Pick a standard security protocol that is widely supported by all the devices –Such as IPSec 22

Guide to Firewalls and VPNs, 3 rd Edition VPN Setups When three or more networks or individuals need to be connected: –Mesh configuration –Hub-and-spoke arrangement –Hybrid setup 23

Guide to Firewalls and VPNs, 3 rd Edition Mesh Configuration Each participant has an approved relationship with every other participant –Called a security association (SA) Need to specifically identify each of these participants to every other participant that uses the VPN Figure 10-5 –Four separate LANs are joined in a mesh VPN 24

Guide to Firewalls and VPNs, 3 rd Edition25 Figure 10-5 Mesh Cengage Learning 2012

Guide to Firewalls and VPNs, 3 rd Edition Hub-and-Spoke Configuration Single VPN router contains records of all SAs in the VPN Any LANs or computers need to connect to the central server Makes it easy to increase the size of the VPN –As more branch offices or computers are added See Figure 10-6 Drawback: centralization slows down communications 26

Guide to Firewalls and VPNs, 3 rd Edition27 Figure 10-6 Hub-and-Spoke Cengage Learning 2012

Guide to Firewalls and VPNs, 3 rd Edition Hybrid Configuration Mesh configurations tend to operate more efficiently As branch offices are added –Add as spokes that connect to a central VPN router at the central office Hybrid setup –Combines the two configurations –Benefits from the strengths of each one 28

Guide to Firewalls and VPNs, 3 rd Edition Configurations and Extranet and Intranet Access Extranet –Each end of the VPN represents an extension of your organizational network to a new location –Each remote user or business partner should have firewalls and antivirus software enabled Intranet –Give parts of organization access to other parts –VPN users inside organization should have usage limits and antivirus and firewall protection 29

Guide to Firewalls and VPNs, 3 rd Edition Tunneling Protocols Used with VPNs Widespread acceptance of the IPSec protocol with the Internet Key Exchange (IKE) system –Proprietary protocols are used far less often than in the past 30

Guide to Firewalls and VPNs, 3 rd Edition IPSec/IKE IPSec –Standard for secure encrypted communications –Two security methods: Authenticated Headers (AH) and Encapsulating Security Payload (ESP) –Different modes: Transport mode and tunnel mode Concerns about using tunnel mode in a client-to- site VPN 31

Guide to Firewalls and VPNs, 3 rd Edition IPSec/IKE (cont’d.) IKE –Means of using public key cryptography to encrypt data between LANs or between a client and a LAN –Provides for the exchange of public and private keys If VPN uses more than one kind of firewall –Check with the manufacturers of those firewalls to see if their products will work with the other firewalls you have 32

Guide to Firewalls and VPNs, 3 rd Edition PPTP Point-to-Point Tunneling Protocol (PPTP) Commonly used to a network using a dial-in modem connection Uses Microsoft Point-to-Point Encryption (MPPE) Useful if support for older clients is needed 33

Guide to Firewalls and VPNs, 3 rd Edition L2TP Layer 2 Tunneling Protocol (L2TP) Extension of the protocol long used to establish dialup connections on the Internet Uses IPSec rather than MPPE to encrypt data Provides secure authenticated remote access by encapsulating data into packets that are sent over a PPP channel 34

Guide to Firewalls and VPNs, 3 rd Edition PPP Over SSL and PPP Over SSH Point-to-Point Protocol (PPP) over Secure Sockets Layer (SSL) and Point-to-Point Protocol (PPP) Over Secure Shell (SSH) UNIX-based methods for creating VPNs Combine an existing tunnel system (PPP) with a way of encrypting data in transport (SSL or SSH) SSL –Public key encryption system –Used to provide secure communications over the World Wide Web 35

Guide to Firewalls and VPNs, 3 rd Edition PPP Over SSL and PPP Over SSH (cont’d.) 36 Table 10-1 VPN Protocols and Their Uses

Guide to Firewalls and VPNs, 3 rd Edition Enabling Remote Access Connections Within VPNs Issue VPN client software user Make sure the user’s computer is equipped with antivirus software and a firewall May need to obtain a key for the remote user International VPN –May have to sign up with several different providers to obtain dial-up access from certain locations 37

Guide to Firewalls and VPNs, 3 rd Edition Configuring the Server Firewall-based VPN –Identify the client computer –Major operating systems incorporate their own methods of providing secure remote access Linux: IP Masquerade Windows: Wizard that makes it easy to set up a workstation to make a VPN connection 38

Guide to Firewalls and VPNs, 3 rd Edition Configuring Clients Configure each client that wants to use the VPN Consider whether: –The client software will work with all client platforms –The client workstation is itself protected by a firewall All users of VPN extend the LAN –Open up a new “hole” through which viruses and hackers can gain access 39

Guide to Firewalls and VPNs, 3 rd Edition VPN Best Practices Security policy rules that specifically apply to the VPN Integration of firewall packet filtering with VPN traffic Auditing the VPN to make sure it is performing acceptably 40

Guide to Firewalls and VPNs, 3 rd Edition The Need for a VPN Policy Essential for: –Identifying who can use the VPN –Ensuring that all users know what constitutes proper use of the VPN 41

Guide to Firewalls and VPNs, 3 rd Edition The Need for a VPN Policy (cont’d.) Policy should state: –Who should have VPN access to network –Whether authentication is to be used and how it is to be used –Whether split tunneling is permitted –How long users can be connected using the VPN at any one session –Whether virus protection is included 42

Guide to Firewalls and VPNs, 3 rd Edition Connecting from Personal Computers Remote users must be carefully trained Understand that all organizational security policies apply during VPN use –Even when connecting from personal equipment 43

Guide to Firewalls and VPNs, 3 rd Edition Packet Filtering and VPNs Decide where data encryption and decryption will be performed in relation to packet filtering Figure –Encryption and decryption outside the packet- filtering perimeter Figure –Encryption and decryption performed inside the packet-filtering perimeter using the tunnel method 44

Guide to Firewalls and VPNs, 3 rd Edition45 Figure External Cengage Learning 2012

Guide to Firewalls and VPNs, 3 rd Edition46 Figure Internal Cengage Learning 2012

Guide to Firewalls and VPNs, 3 rd Edition Packet Filtering and VPNs (cont’d.) PPTP Filters –See Table 10-2 L2TP and IPSec Packet-Filtering Rules –See Table

Guide to Firewalls and VPNs, 3 rd Edition48 Table 10-2 PPTP Packet-Filtering Rule Set Table 10-3 PPTP Packet-Filtering Rule Set 2

Guide to Firewalls and VPNs, 3 rd Edition Auditing and Testing the VPN Test VPN client on each computer that might use the VPN Choose client software that is easy for end users to install on their own –Save time and effort Check the VPN –Make sure files are being transferred at an acceptable rate –All parts of the VPN remain online when needed 49

Guide to Firewalls and VPNs, 3 rd Edition Auditing and Testing the VPN (cont’d.) If part of the network goes down frequently: –Switch to another ISP –Asking ISPs questions to help determine which ones are best 50

Guide to Firewalls and VPNs, 3 rd Edition Summary VPN devices –Special hardware or with firewall software that includes VPN Essential activities: –IP encapsulation, data payload encryption, and encrypted authentication General types of VPN: –Site-to-site and client-to-site VPN architecture: –Mesh or hub-and-spoke 51

Guide to Firewalls and VPNs, 3 rd Edition Summary (cont’d.) Protocols –IPSec –Internet Key Exchange (IKE) –Point-to-Point Tunneling Protocol (PPTP) –Layer 2 Tunneling Protocol (L2TP) –Point-to-Point Protocol (PPP) over Secure Sockets Layer (SSL) –Point-to-Point Protocol (PPP) over Secure Shell (SSH) 52