VPN’s & Remote Access Issues David Trepp VP of Technology

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Agenda Virtual Private Networks (VPNs) Motivation and Basics Deployment Topologies IPSEC (IP Security) Authentication Header (AH) Encapsulating Security.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Virtual Private Networks and IPSec
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Virtual Private Networking Karlene R. Samuels COSC513.
Internet Security Seminar Class CS591 Presentation Topic: VPN.
Remote Networking Architectures
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Virtual Private Network
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Network+ Guide to Networks 6 th Edition Chapter 10 Virtual Networks and Remote Access.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
WAN Technologies Dial-up modem connections
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Guide to Firewalls and VPNs, 3 rd Edition Chapter Ten Setting Up A Virtual Private Network.
CAEN Wireless Network College of Engineering University of Michigan October 16, 2003 Dan Maletta.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
Generic Routing Encapsulation GRE  GRE is an OSI Layer 3 tunneling protocol: Encapsulates a wide variety of protocol packet types inside.
Virtual Private Networks (VPNs) Source: VPN Technologies: Definitions and Requirements. VPN Consortium, July 2008.VPN Technologies: Definitions and Requirements.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Virtual Private Network (VPN)
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
Virtual Private Networks Manraj Sekhon. What is a VPN?
VPN: Virtual Private Network Presented By: Wesam Shuldhum ID:
Virtuelne Privatne Mreže 1 Dr Milan Marković. VPN implementations  In the following sections we will discuss these popular VPN implementation methods,
Securing Access to Data Using IPsec Josh Jones Cosc352.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Lecture 10 Page 1 CS 236 Online SSL and TLS SSL – Secure Socket Layer TLS – Transport Layer Security The common standards for securing network applications.
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks (VPN)
Virtual Private Network (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Networks
VPN: Virtual Private Network
Virtual Private Network (VPN)
Virtual Private Network
VPN: Virtual Private Network
Cengage Learning: Computer Networking from LANs to WANs
Virtual Private Networks (VPN)
Topic 12: Virtual Private Networks
Presentation transcript:

VPN’s & Remote Access Issues David Trepp VP of Technology

Housekeeping Issues Duration: 1.25 hours +/- Questions & comments: early and often

Why We’re Here Examine a brief summary of considerations surrounding successful VPN and remote access planning, deployment and management. Note other perimeter security issues.

What is a VPN? Virtual Private Network - A network that performs private, trusted data transmissions over a public, untrusted network (e.g. the Internet). Usage: –Point to Point(s) –Remote Access –Hybrid

Essential VPN Definitions Authentication – A method of establishing identity between systems or users. Authorization – The right to access a network service after authentication has taken place. CIA – Confidentiality, Integrity, Availability – The three primary ways your (or your customer’s) information can be compromised.

More Essential VPN Definitions (Cont.) Encryption – The process of converting cleartext into what appears to be random characters (a.k.a. ciphertext) – FIPS standards include DES, 3DES, AES Tunneling – Encapsulation of packets within other packets, primarily for transmission across public IP networks (e.g. the Internet) – i.e. IPSec, L2TP, PPTP, PPP

VPN Economic Considerations VPN’s can be less expensive than WAN’s and more functional and secure than modem banks. Often cost-benefit compared with voice over solutions. Decision criteria include: –Current connectivity costs –Distances –Locations –# of sites –Type & volume of traffic –Existing equipment & software

Basic VPN Connectivity Steps Site-to-Site –1) Authenticate once –2) Encapsulate an IP packet –3) Encrypt and transmit –4) De-crypt –5) Un-encapsulate Remote Access –1) Authenticate each time a session begins –2) See 2 – 5 above

VPN Scaling Considerations Processor Cycles: number of tunnels (hence, processor cycles) is greater for remote user deployments than for a single site-to-site connection (i.e. 10 remote users require more processor cycles than 100 users across a site- to-site VPN). Bandwidth: depends on how the applications are deployed, but the VPN tunnel itself adds approximately 10-30% overhead.

VPN Security Considerations Authentication & Authorization! Centrally manageable firewalls at remote sites and/or users. Generic O/S’s vs. pre-hardened firewall/VPN device O/S’s. Application security.

VPN Technical Considerations Latency > 200ms causes application errors – (often a problem for remote users with DSL connections). Non-standard tunneling, encryption and hardware/software solutions can cause problems. Meshing site-to-site(s) VPN’s for fault tolerance is complex. VPN access for remote users does not mean complete network/application access. Every O/S on remote user PC’s has its own idiosyncrasies.

Proven VPN & Remote Access Solutions CheckPoint VPN-1: + Management of remote site and user security + Runs on appliances w/ hardened O/S’s (e.g. Nokia) + Supports many authentication schemes - $ Citrix NFUSE with Secure Gateway + Requires only browser and authentication mechanism + Supports many authentication schemes - Not a complete solution for site-to-site VPN Cisco/Altiga VPN + VPN concentrator has easy remote client setup + Runs on appliance w/ hardened O/S + Supports many authentication schemes - Limited management of remote user security

Other Perimeter Security Considerations Mail Relay/Virus Scanning Intrusion Detection Voice Systems Backdoors Web Servers Vendor/Business Partners

Regulatory Considerations FITSAF (any departments dealing with the federal government) – rity_assessment_framework_ htmlhttp:// rity_assessment_framework_ html HIPAA (health departments) – t.htmhttp://aspe.os.dhhs.gov/adminsimp/nprm/seclis t.htm

References Good white papers and suchhttp:// Internet Week VPN sitehttp:// vpnsolutions.htmlhttp:// vpnsolutions.html Check Point VPN site teway.asphttp:// teway.asp Citrix Secure gateway press release chnologies/VPNs.htmlhttp:// chnologies/VPNs.html Cisco VPN site