Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Module 5: Configuring Access for Remote Clients and Networks.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Guide to Network Defense and Countermeasures Second Edition
Virtual Private Networks and IPSec
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Internet Protocol Security (IPSec)
VPN – Virtual Private Networking. VPN A Virtual Private Network (VPN) connects the components of one network over another network. VPNs accomplish this.
Remote Networking Architectures
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
NetComm Wireless VPN Functionality Feature Spotlight.
DrayTek VPN Solution. Outline What is VPN What does VPN Do Supported VPN Protocol How Many Tunnels does Vigor Support VPN Application Special VPN Application.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Securing Site-to-Site Connectivity Connecting Networks.
Virtual Private Networks Alberto Pace. IT/IS Technical Meeting – January 2002 What is a VPN ? u A technology that allows to send confidential data securely.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing.
1. Collision domains are unsecure 2. The employees often need to remote access to corporate network resources  The Internet traffic is much more vulnerable.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Secure Socket Layer (SSL)
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
1 Chapter 8 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration VPNs.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
By Kevin Stevens UAT NTS4150. Definition: A Virtual Private Network (VPN) is a technology that allows secure communication via a “tunnel,” across public.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
V IRTUAL P RIVATE N ETWORKS K ARTHIK M OHANASUNDARAM W RIGHT S TATE U NIVERSITY.
Abdullah Alshalan Garrett Drown Group #4 CSE591 - Virtualization and Cloud Computing.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
VPN: Virtual Private Network Presented By: Wesam Shuldhum ID:
 authenticated transmission  secure tunnel over insecure public channel  host to host transmission is typical  service independent WHAT IS NEEDED?
Virtuelne Privatne Mreže 1 Dr Milan Marković. VPN implementations  In the following sections we will discuss these popular VPN implementation methods,
Securing Access to Data Using IPsec Josh Jones Cosc352.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Windows 10 Common VPN Error Tech Support Number
Virtual Private Networks
Virtual Private Networks and IPSec
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Networks
Microsoft Windows NT 4.0 Authentication Protocols
Remote Access Lecture 2.
Cengage Learning: Computer Networking from LANs to WANs
Virtual Private Networks (VPN)
Virtual Private Network zswu
Presentation transcript:

Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing

Outline Project Goal New Technical Background Current Network Layout Roadmap of our Project Status of our tasks Summary Challenges Faced CSE591: Virtualization and Cloud Computing

Project Goal Provide users of Android devices with several reliable options for accessing a cloud via a VPN connection. CSE591: Virtualization and Cloud Computing

Technical Background There are several different protocols users may wish to use. PPTP L2TP L2TP/IPSec SSL VPN CSE591: Virtualization and Cloud Computing

PPTP Point-To-Point Tunneling Protocol (PPTP): Developed by Microsoft Generally: Maintains a control channel over a TCP connection. Through that, it initiates a GRE tunnel PPP packets are sent through a GRE tunnel (Generic Routing Encapsulation). The PPP traffic is authenticated using protocols like PAP, CHAP, etc. The PPP payload can be encrypted using MPPE. CSE591: Virtualization and Cloud Computing

L2TP Layer 2 Tunneling Protocol (L2TP): L2TP: It’s initiated over UDP L2TP itself does not provide any encryption or authentication. It simply provides the tunnel. L2TP/IPSec: 3 major steps to establish it: Negotiation of IPSec Security Association using pre- shared key or a certificate. Establishing ESP communication, hence a secure channel. Establishing a L2TP tunnel over the secure channel. CSE591: Virtualization and Cloud Computing

SSL VPN Encrypt everything above the Transport Layer using SSL protocols. Runs over TCP or UDP. Uses pre-shared keys or certificates for authentication Always uses the strongest encryption that both the server and client support. Capable of traversing NATs and firewalls and proxy servers. CSE591: Virtualization and Cloud Computing

Network Diagram CSE591: Virtualization and Cloud Computing Virtual Private Network

Roadmap of Project By midterm: Set up, document, and test all possible server (Linux/Windows) and protocol combinations with the native Android client. (95% Completed) Place a web server inside our VPN and have the mobile device access it through a VPN connection. (Completed) By final: Have L2TP/IPSec with Certificates working. Set up an SSL VPN Server (with OpenVPN) Find a client for SSL VPN (without need for rooting) Website for Registration Documentation of how we did what we did If time permits: Set up the native client to automatically reconnect when the connection is lost. CSE591: Virtualization and Cloud Computing

Native Android Client We have successfully set up the native Android VPN client to work with the following configurations: Linux using L2TP Linux using L2TP IPSec PSK Windows using PPTP with no encryption Windows using PPTP with encryption Windows using L2TP IPSec PSK CSE591: Virtualization and Cloud Computing

Native Android Client For each of the configurations we have documented the steps we took to set up the VPN Servers and the VPN clients on the Android device. This allows others to easily reproduce and expand on our work. In the future, we will add more screenshots to this document to help future users with the process. CSE591: Virtualization and Cloud Computing

Web Server inside VPN We have successfully set up a Web Server inside of our VPN testing environment. This allows us to verify that our VPN is working correctly. Once the Android device has connected to the VPN we then see if the device can access the web site hosted on this server, which would otherwise be unavailable. CSE591: Virtualization and Cloud Computing

Summary of Findings Server/ Client Linux ServerWindows Server L2TPL2TP CRT L2TP PSK SSL VPN PPTP w/Enc PPTP No Enc L2TPL2TP CRT L2TP PSK SSL VPN Native Android Client 3 rd Party Android Client CSE591: Virtualization and Cloud Computing

Challenges Faced Setting up the Web Server Dynamic IPs at ASU Setting up Apache Windows Firewall Setting up Linux VPN Servers Limited Documentation Personal solutions provided online Compatibility issues CSE591: Virtualization and Cloud Computing

Questions? CSE591: Virtualization and Cloud Computing