DHCP Configuration of IPSEC Tunnel Mode Draft-ipsec-dhcp-05.txt Bernard Aboba Microsoft.

Slides:



Advertisements
Similar presentations
Guide to Network Defense and Countermeasures Second Edition
Advertisements

DHCP Configuration of IPSEC Tunnel Mode Draft-ipsec-dhcp-08.txt Bernard Aboba Microsoft.
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 11: Planning Network Access.
History DHCP was first defined as a standards track protocol in RFC 1531 in October 1993, as an extension to the Bootstrap Protocol (BOOTP). The motivation.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
RFC 2131 DHCP. Dynamic Host Configuration Protocol.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Internet Protocol Security (IPSec)
K. Salah1 Security Protocols in the Internet IPSec.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Overview of Routing and Remote Access Service (RRAS) When RRAS was implemented in Microsoft Windows NT 4.0, it added support for a number of features.
Module 6: NAT As a Solution for Internet Connectivity.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 9 Network Policy and Access Services in Windows Server 2008.
Protocol Basics. IPSec Provides two modes of protection –Tunnel Mode –Transport Mode Authentication and Integrity Confidentiality Replay Protection.
Dynamic Host Configuration Protocol (DHCP)
Windows Internet Connection Sharing Dave Eitelbach Program Manager Networking And Communications Microsoft Corporation.
Scenario & Hands-on 7-1 VPN Configuration-PPTP
Mobile IP Traversal Of NAT Devices By, Vivek Nemarugommula.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Objectives Configure routing in Windows Server 2008 Configure Network Address Translation 1.
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Module 12: Routing Fundamentals. Routing Overview Configuring Routing and Remote Access as a Router Quality of Service.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
IPSec ● IP Security ● Layer 3 security architecture ● Enables VPN ● Delivers authentication, integrity and secrecy ● Implemented in Linux, Cisco, Windows.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 4: Configuring Site to Site VPN with Pre-shared keys.
1 Virtual Private Networks (VPNs) and IP Security (IPSec) G53ACC Chris Greenhalgh.
TCP/IP Protocol Suite DHCP The Dynamic Host Configuration Protocol (DHCP) provides static and dynamic address allocation that can be manual or automatic.
1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Dynamic Host Configuration Protocol (DHCP)
Routing with Windows Server 2003 Chapter 9. Objectives for this Chapter Manage Routing And Remote Access routing interfaces Manage packet filters Manage.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
1 IPSec: An Overview Dr. Rocky K. C. Chang 4 February, 2002.
K. Salah1 Security Protocols in the Internet IPSec.
Securing Access to Data Using IPsec Josh Jones Cosc352.
Virtual Private Network (VPN)
Microsoft Windows NT 4.0 Authentication Protocols
Network Address Translation
IT443 – Network Security Administration Instructor: Bo Sheng
Configuring and Troubleshooting Routing and Remote Access
IPSec VPN Chapter 13 of Malik.
Virtual Private Network (VPN)
Topic 12: Virtual Private Networks
Presentation transcript:

DHCP Configuration of IPSEC Tunnel Mode Draft-ipsec-dhcp-05.txt Bernard Aboba Microsoft

Outline Configuration Requirements Security Requirements DHCP usage Address pool selection Walkthrough Summary

Configuration Requirements To obtain an IP address and other configuration parameters appropriate to the class of host To reconfigure when required To support failover –Want to be able to maintain address/configuration state between VPN server failures To integrate with existing IP address management facilities such as DHCP –Want single point of address and configuration management

Security Requirements To support address pool management –Examples Extranet where vendors, contractors, employees have different access levels, allocated out of different address pools Intranet where sales, marketing, engineering have different quality of service levels, allocated out of different pools To authenticate where required –Since DHCP server typically not co-located with VPN server, can’t assume access to IKE credentials –DHCP authentication required to prove claim of identity in the client-identifier-option

DHCP Packet Body Hardware address length (hlen), hardware type (htype), client hardware address (chaddr) –Should be unique to the segment client is connecting to –Hardware identifier tells VPN server/DHCP relay which VPN interface to forward DHCP messages to Client-identifier-option isn’t returned by DHCP server –LAN: Use interface hardware address –Dialup: Use outer IP address + 2 random octets Not consistent between reboots Should a different htype be used for VPN? –Would make it easier for DHCP server to distinguish VPN clients

DHCP Options Client-identifier-option –Must be unique to client –Consistency between reboots needed –Can use Htype/Chaddr combination as suggested in RFC 2132 In dialup case, not consistent between reboots –Makes it difficult to support user or machine specific policies –Can use FQDN or NAI Consistent between reboots Makes it easier to administer DHCP authentication Classless static route option –Draft-ietf-dhc-csr-00.txt –Replacement for RFC 2132 static route option

Address Pool Selection Support for existing methods for address pool selection –Client hardware address –Client-identifier option –Vendor-class-identifier option –Vendor-specific information option –Relay agent option –User class option –Host name option –Authentication option Can leverage conditional behavior of popular DHCP servers DHCP (even with authentication) is not an Access Control mechanism –Shouldn’t use address assignment as a way of restricting access; client can just choose its own IP address and get around the restrictions

Walkthrough The remote host establishes an IKE MM or AM security association with the VPN server. The remote host establishes a DHCP tunnel mode QM SA with the VPN server. –Filters From client to server: Any to Any, destination: UDP port 67 From server to client: Any to Any, destination: UDP port 68 DHCP messages are exchanged between the remote host and the DHCP server, using the VPN server as a DHCP relay, configuring the intranet interface of the remote host. –Security gateway needs to snoop the DHCPACK to learn the IP address assigned to the VPN interfaces The remote host MAY request deletion of the DHCP SA or the remote host and VPN server MAY continue to use the same SA for all subsequent traffic by adding temporary SPD selectors as with name ID types. The remote host establishes a tunnel mode SA to the VPN server in a quick mode exchange.

L2TP IPSEC Tunnel Mode Authenticated Tunnels IPSEC IPSEC Authenticated Calls Yes Yes Integrity Protection IPSEC IPSEC KeepaliveLCP, L2TPIKE NAT friendlinessNoYes (w/QM restrictions) Address Allocation IPCP DHCP Configuration DHCPINFORMDHCP Multiprotocol YesNo Encryption IPSEC IPSEC Compression PPP or IPPCP IPPCP Routing protocolsYesYes, if treated as interface IPSEC Remote Access Protocol Comparison