Download presentation
Presentation is loading. Please wait.
Published byScott Bates Modified over 9 years ago
1
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication
2
Topic A Topic A: Network access security methods Topic B: User authentication
3
Network Access Control Ensures that computers comply with security policies Network Access Protection (NAP) Overall NAC architecture
4
Access control lists MAC address filtering IP address and port filtering
5
VPN technologies Authentication Tunneling Encryption
6
VPN security models Authentication before connection Trusted delivery network Secure VPNs
7
VPN protocols PPTP L2TP IPSec SSL/TLS
8
PPTP vs. L2TP Encryption Authentication Data protocols Port
9
IPSec protocols Authentication Header (AH) Encapsulating Security Payload (ESP) IP Payload Compression Protocol (IPComp) Internet Key Exchange (IKE)
10
IPSec encryption Transport mode Tunnel mode
11
PPPoE Encapsulates PPP inside Ethernet frames Allows users to establish a secure connection from one computer to another Used to connect multiple users to the Internet through DSL and cable modem connections
12
Remote desktop services RDP (Remote Desktop Protocol) ICA (Independent Computing Architecture)
13
SSH Remote command-line access Server service and client program Native to Linux distributions SSH-2 –Transport layer –User Authentication layer –Connection layer
14
Activity A-1 Discussing network access security methods
15
Topic B Topic A: Network access security methods Topic B: User authentication
16
AAA Authentication Authorization Accounting
17
Authentication factors Something you know Something you have Something you are
18
One-factor authentication Something you know OR something you have OR something you are
19
Two-factor authentication Something you know PLUS –Something you have OR something you are
20
Three-factor authentication Something you know + something you have + something you are
21
Single sign-on User is authenticated to other resources based on strength of initial sign-on SSL, LDAP Windows Live ID, Microsoft Passport, Open ID
22
Kerberos Current version is 5 Provides authentication on physically insecure networks Freely available in U.S. and Canada Authenticates users over open multi- platform network using single login
23
Kerberos system components Principal Authentication server Ticket-granting server Key distribution center Realm Remote ticket-granting server
24
Kerberos data types Credentials Session key Authentication Ticket Ticket-granting ticket
25
Kerberos authentication process
26
CHAP
27
EAP PPP extension Used in wireless connections Can use token cards, one-time passwords, certificates, biometrics Runs over Data Link layers Defines formats –LEAP –EAP-TLS –EAP-FAST
28
PPPoE PPP encapsulated inside Ethernet frames Connects multiple uses to Internet
29
Mutual authentication Client and server authenticate to each other Also known as two-way authentication Trust other computer’s digital certificate Can block rogue services
30
Cryptography Science of encryption Encryption = convert to unreadable format Decryption = convert back to readable format Algorithm = procedure for encrypting or decrypting Cipher = encryption & decryption algorithm pair
31
ROT13 cipher
32
Keys Secret information used by cipher Symmetric = same key for encryption and decryption Asymmetric = differing keys for encryption and decryption Key sharing and management issues
33
Symmetric encryption in action
34
Public key cryptography Asymmetric Two keys –What one encrypts, only the other can decrypt –One kept private –One shared (public) Encryption process Keys mathematically related
35
Asymmetric encryption in action
36
Public key cryptography Mathematically difficult to derive private key from public key Data encrypted with public key can be decrypted with only private key Data encrypted with private key can be decrypted with only public key
37
Public key infrastructure Certificate authority (CA) Registration authority (RA) Certificate server
38
Setup and initialization phase Process components –Registration –Key pair generation –Certificate generation –Certificate dissemination
39
RADIUS Remote Authentication Dial-in User Service Client = network access server or device (e.g., wireless router) Server = AAA service provider
40
RADIUS authentication 1.User connects to NAS 2.RADIUS client requests authentication from server 3.User supplies logon credentials 4.Client encrypts and forwards to server 5.Server authenticates, returns message 6.Client receives message and acts –Accept –Reject –Challenge
41
TACACS+ Terminal Access Controller Access Control System –TACACS –XTACACS AAA functions
42
TACACS+ vs. RADIUS TCP rather than UDP Message body fully encrypted AAA services provided independently Flexible –Username/password, ARA, SLIP, PAP, CHAP, Telnet Multiprotocol –TCP/IP, AppleTalk, NetBIOS Novell Asyc Services Interface, X.25
43
802.1x Authentication protocol Device access control Works with RADIUS and TACACS+ Device roles –Supplicant (end-user device) –Authenticator –Authentication server
44
Activity B-1 Discussing methods of authenticating users
45
Unit summary Explained the methods of ensuring network access security Explained methods of user authentication
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.