Network Security. Chapter 10 Security Protocols of the Data Link Layer
|
|
|
- Osborn James
- 10 years ago
- Views:
Transcription
1 Network Security Chapter 10 Security Protocols of the Data Link Layer! IEEE 802.1x! Point-to-Point Protocol (PPP)! Point-to-Point Tunneling Protocol (PPTP)! Layer 2 Tunneling Protocol (L2TP)! Virtual Private Networks (VPN) Network Security (WS 2002): 10 Link Layer Security Protocols 1
2 Scope of Link Layer Security Protocols! According to the classical understanding of the OSI model, the link layer provides an assured data transmission service between two peer entities that are directly inter-connected by a communications medium! Its main tasks are:! Error detection and correction! Medium access control (MAC, not to be mixed up with message authentication code) for shared media, e.g. Ethernet, etc.! Not all of today s networking technology fits nicely into that model:! Dial-up connections to an Internet service provider! Virtual Private Network (VPN) solutions! In this class, we content ourselves with the following definition:! The purpose of a link layer security protocol is to ensure specific security properties of link layer PDUs, that is the PDUs of the protocol layer carrying the PDUs of the network layer (e.g. IP) Network Security (WS 2002): 10 Link Layer Security Protocols 2
3 IEEE 802.1x: Background & Goals! The Institute of Electrical and Electronics Engineers (IEEE) 802 LAN/MAN Standards Committee develops local area network standards and metropolitan area network standards! The most widely used standards are:! Ethernet family (802.3, generally referred to as CSMA/CD),! Token Ring (802.5),! Wireless LAN (802.11)! The IEEE committee is currently working on a standard that:! aims to restrict access to the services offered by a LAN to those users and devices that are permitted to make use of those services! may be used with different IEEE 802.x technologies! defines port based network access control to provide a means of authenticating and authorizing devices attached to a LAN port that has point-to-point connection characteristics! is generally referred to as IEEE 802.1x Network Security (WS 2002): 10 Link Layer Security Protocols 3
4 IEEE 802.1x: Controlled and Uncontrolled Ports System Controlled Port Uncontrolled Port Point of Attachment LAN! IEEE 802.1x introduces the notion of two logical ports:! the uncontrolled port allows to authenticate a device! the controlled port allows an authenticated device to access LAN services Network Security (WS 2002): 10 Link Layer Security Protocols 4
5 IEEE 802.1x: Roles! Three principal roles are distinguished:! A device that wants to use the service offered by an IEEE 802.1x LAN acts as a supplicant requesting access to the controlled port! The point of attachment to the LAN infrastructure (e.g. a MAC bridge) acts as the authenticator demanding the supplicant to authenticate itself! The authenticator does not check the credentials presented by the supplicant itself, but passes them to his authentication server for verification! Accessing a LAN with IEEE 802.1x security measures:! Prior to successful authentication the supplicant can access the uncontrolled port: The port is uncontrolled in the sense, that it allows access prior to authentication However, this port allows only restricted access! Authentication can be initiated by the supplicant or the authenticator! After successful authentication the controlled port is opened Network Security (WS 2002): 10 Link Layer Security Protocols 5
6 IEEE 802.1x Security Protocols & Message Exchange! IEEE 802.1x does not define its own security protocols, but advocates the use of existing protocols:! The Extensible Authentication Protocol (EAP) may realize basic device authentication [RFC 2284]! If negotiation of a session key during authentication is required, the use of the PPP EAP TLS Authentication Protocol is recommended [RFC 2716]! Furthermore, the authentication server is recommended to be realized with the Remote Authentication Dial In User Service (RADIUS) [RFC 2865]! Exchange of EAP messages between supplicant and authenticator is realized the with the EAP over LANs (EAPOL) protocol:! EAPOL defines the encapsulation techniques that shall be used in order to carry EAP packets between supplicant port access entities (PAE) and Authenticator PAEs in a LAN environment! EAPOL frame formats have been defined for various members of the 802.x protocol family, e.g. EAPOL for Ethernet,...! Between supplicant and authenticator RADIUS messages may be used Network Security (WS 2002): 10 Link Layer Security Protocols 6
7 IEEE 802.1x: Example of an 802.1x Authentication Supplicant PAE Authenticator PAE Authentication Server EAPOL-Start EAP-Request/Identity EAP-Response/Identity(MyID) EAP-Request/OTP OTP Passwd EAP-Request/OTP OTP Challenge Authentication successfully completed Port authorized EAP-Success [source: IEEE Draft P802.1X/D11] Network Security (WS 2002): 10 Link Layer Security Protocols 7
8 Point-to-Point Protocol: Purpose and Tasks! Large parts of the Internet rely on point-to-point connections:! Wide area network (WAN) connections between routers! Dial-up connections of hosts using modems and telephone lines! Protocols for this purpose:! Serial Line IP (SLIP): no error detection, supports only IP, no dynamic address assignment, no authentication [RFC 1055]! Point-to-Point Protocol (PPP): successor to SLIP, supports IP, IPX,... PPP Internet Host Modem Modem Provider! PPP [RFC 1661/1662]:! Layer-2 frame format with frame delimitation and error detection! Control protocol (Link Control Protocol, LCP) for connection establishment, -test, -negotiation, and -release! Separate Network Control Protocols (NCP) for supported Layer-3 protocols Network Security (WS 2002): 10 Link Layer Security Protocols 8
9 Point-to-Point Protocol: Packet Format or 2 variable 2 or 4 1 Octets Flag Address Control Protocol Payload Checksum Flag ! Character-oriented (instead of bit-oriented) byte aligned frames! Code transparency achieved through character stuffing! Usually only unnumbered frames are transmitted, however, in scenarios with high error probability (wireless communications) a more reliable mode with sequence numbers and re-transmissions can be negotiated! Supported protocols for the payload field are, among others: IP, IPX, Appletalk! If not otherwise negotiated the maximum payload size is 1500 byte! Additional negotiation supports smaller packet headers Network Security (WS 2002): 10 Link Layer Security Protocols 9
10 Point-to-Point Protocol: A Typical PPP Connection! Usage Scenario Internet access of a PC via modem :! User calls Internet service provider (ISP) via modem and establishes a physical connection via the plain old telephone service (POTS)! Caller sends multiple LCP-packets in PPP-frames to chose desired PPPparameters! Security specific negotiation (see below)! Exchange of NCP-packets to configure network layer: e.g. configuration of IP including dynamic allocation of an IP address via Dynamic Host Configuration Protocol (DHCP)! Caller may use arbitrary Internet services like any other host with a fixed connection to the Internet! For connection termination the allocated IP address and the network layer connection are released! The layer-2 connection is released via LCP and the modem closes down the physical connection Network Security (WS 2002): 10 Link Layer Security Protocols 10
11 Point-to-Point Protocol: Link Control Protocol! Frame format of the Link Control Protocol (LCP):! Code: configure-request, configure-ack, configure-nack, configure-reject, terminate-request, terminate-ack, code-reject, protocol-reject, echorequest, echo-reply, discard-request! Length: indicates the length of the LCP-packet including the code field etc.! Data: zero or more octets of command-specific data Code Identifier Length Data... (if any)! The configure primitives of LCP allow to configure the link layer:! There exist various options for this primitive for configuration of different aspects (max. receive unit, protocol compression, authentication,...) Network Security (WS 2002): 10 Link Layer Security Protocols 11
12 Point-to-Point Protocol: Security Services! The original version of PPP [RFC 1661] suggests the optional run of an authentication protocol after the link establishment phase:! If required, authentication is demanded by one peer entity via an LCP Configuration-Request at the end of the link establishment phase! Originally, two authentication protocols have been defined: Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP)! Meanwhile, an extensible protocol has been defined: Extensible Authentication Protocol (EAP) PPP EAP Transport Level Security Protocol (PPP-EAP-TLS)! Furthermore, encryption can be negotiated after authentication:! Protocols: Encryption Control Protocol (ECP) for negotiation PPP DES Encryption Protocol (DESE) PPP Triple DES Encryption Protocol (3DESE) Network Security (WS 2002): 10 Link Layer Security Protocols 12
13 Point-to-Point Protocol: Authentication Protocols (1)! Password Authentication Protocol (PAP):! PAP was defined 1992 in RFC 1334! The protocol is very simple: Prerequisite: the authenticator knows a password of the peer entity At the end of the link establishment phase one entity, called authenticator, demands the peer entity to authenticate with PAP The peer entity sends an authenticate-request message containing its peer ID and password The authenticator checks if the provided information is correct and answers with either an authenticate-ack or an authenticate-nack! As the protocol provides no cryptographic protection, it is insecure! PAP is not mentioned in updated RFCs for PPP authentication [RFC1994] Network Security (WS 2002): 10 Link Layer Security Protocols 13
14 Point-to-Point Protocol: Authentication Protocols (2)! Challenge Handshake Authentication Protocol (CHAP):! CHAP is also defined in RFC 1334 and RFC 1994! It realizes a simple challenge-response protocol: Prerequisite: authenticator and peer entity share a secret After the link establishment phase the authenticator (A) sends a challenge message containing an identifier for this challenge, a random number r A, and its name to the peer entity (B): A B: (1, identifier, r A, A) The peer entity computes a cryptographic hash function over its name, the shared secret K A,B and the challenge random number r A and sends the following message: B A: (2, identifier, H(B, K A,B, r A ), B) Upon reception of this message the authenticator re-computes the hash value and compares it with the received one; if both values match it answers with a success message RFC 1994 specifies, that MD5 must be supported as hash function, but use of other hash functions can be negotiated Network Security (WS 2002): 10 Link Layer Security Protocols 14
15 Point-to-Point Protocol: Authentication Protocols (3) ! CHAP message format: Code Identifier Length Value Size Value... Name...! Code: 1 ~ challenge / 2 ~ response! Identifier: one octet that has to be changed with every challenge sent! Length: the overall length of the CHAP message in octets! Value Size: one octet indicating the length of the value! Value: contains the random challenge / the response to the challenge! Name: one or more octets identifying the system that created the packet, the size of the name is calculated using the length field Network Security (WS 2002): 10 Link Layer Security Protocols 15
16 Point-to-Point Protocol: Authentication Protocols (4) Code Identifier Length Message...! CHAP message format:! Code: 3 ~ success / 4 ~ failure! Identifier: one octet that has to be changed with every challenge sent! Length: the overall length of the CHAP message in octets! Message: Zero or more octets with implementation-dependent content Its content is supposed to be human readable and has no influence on the operation of the protocol Network Security (WS 2002): 10 Link Layer Security Protocols 16
17 Point-to-Point Protocol: Authentication Protocols (5)! Extensible Authentication Protocol (EAP):! EAP is an general protocol for PPP authentication which supports multiple authentication methods [RFC2284]! The main idea behind EAP is to provide a common protocol to run more elaborate authentication methods than 1 question + 1 answer! The protocol provides basic primitives: Request, Response: further refined by type field + type specific data Success, Failure: to indicate the result of an authentication exchange! Type fields: Identity Notify Nak (response only, to answer unacceptable request types) MD5 Challenge (this corresponds to CHAP) One-Time Password (OTP): defined in [RFC2289] Generic Token Card EAP-TLS Network Security (WS 2002): 10 Link Layer Security Protocols 17
18 Point-to-Point Protocol: Authentication Protocols (6)! One-Time Password (OTP):! The basic idea of OTP is to transmit a password, that can only be used for one run of an authentication dialogue! Initial Setup: The authenticator A sends a seed value r A and the peer entity B concatenates it with his password and computes a hash value: PW N = H N (r A, password B ) The pair (N, PW N ) is securely transmitted to the authenticator and stored at the authenticator! Authentication dialogue: A B: N - 1 B A: PW N-1 := H N-1 (r A, password B ) A checks if H(PW N-1 ) = PW N, and stores (N - 1, PW N-1 ) as the new authentication information for B! Security: In order to break this scheme, an attacker would have to eavesdrop one PW N and compute H -1 (PW N ) which is impractical Network Security (WS 2002): 10 Link Layer Security Protocols 18
19 Point-to-Point Protocol: Authentication Protocols (7)! Generic Token Card:! Basically, a challenge response dialogue! A token card is used to compute a response to a challenge:! PPP-EAP-TLS: The challenge is presented to the user who has to type it to his token card device The token card computes and displays the response The user enters the response into the system that sends it as an answer to the challenge message! TLS stands for Transport Layer Security [RFC 2246]! Thus, the authentication dialogue of TLS is run! This dialogue will be explained in detail in chapter 12 on transport layer security Network Security (WS 2002): 10 Link Layer Security Protocols 19
20 Point-to-Point Protocol: Encryption Protocols (1)! After the link establishment and the authentication phase, encryption can be negotiated for a PPP connection:! The Encryption Control Protocol (ECP) [RFC1968] is responsible for configuring and enabling data encryption algorithms on both ends of the PPP link: ECP uses the same frame format as LCP and introduces two new primitives: Reset-Request and Reset-Ack for indicating decryption errors independently for each direction (useful for cryptographic resynchronization) A specific encryption method is negotiated using the configure primitive containing an option specifying DESE, 3DESE, Proprietary, etc. Proprietary encryption protocols are identified by a registered organizational unit identifier (OUI) + a vendor specific value Exactly one ECP packet is transported in the PPP information field of a link layer packet ECP packets are identified by the PPP protocol field: 0x8053 for standard operation 0x8055 for individual link data encryption on multiple links to the same destination Network Security (WS 2002): 10 Link Layer Security Protocols 20
21 Point-to-Point Protocol: Encryption Protocols (2)! The PPP DES Encryption Protocol (DESE):! This class will discuss only the updated version DESEv2 [RFC2419] Code Identifier Length Type Length Initial Nonce......! DESEv2 is negotiated with an ECP configure request message:! Code: 1 ~ configure request! Identifier: changes with every new request! Length: overall length of the configure request message! Type: 3 ~ DESEv2! Length : 10 (the length of this configuration option)! Initial Nonce: an initialization vector for DES in CBC mode (8 octets) Network Security (WS 2002): 10 Link Layer Security Protocols 21
22 Point-to-Point Protocol: Encryption Protocols (3) Data Link Header Address Control Protocol ID Sequence Number Ciphertext Data Link Payload...! PPP DESE v2 message format:! Address: 0x (in case of HDLC-like framing)! Control: 0x (in case of HDLC-like framing)! Protocol ID: 0x0053 ~ DESE (standard) / 0x0055 ~ DESE (individual link)! Sequence Number: initially 0, this number is incremented by the encrypting entity with every packet sent! Ciphertext: the encrypted protocol and information fields of a PPP packet messages are padded to a multiple of 8 octets prior to encryption encryption is realized with DES in CBC mode Network Security (WS 2002): 10 Link Layer Security Protocols 22
23 Point-to-Point Protocol: Encryption Protocols (4)! PPP 3DES Encryption Protocol (3DESE):! PPP 3DESE [RFC2420] is very similar to the PPP DESE! PPP 3DESE is negotiated with a configure request message with the type field of the option set to 2 (~ 3DESE)! Encryption of PPP payload is like DESE, with the difference that 3DES is used with 3 different keys! All of the PPP encryption protocols assume, that a session key for encryption / decryption of PPP packets has been agreed upon prior to the encryption phase:! This assumption is reasonable, as session key establishment is a task that should be fulfilled during the authentication phase! However, only the PPP-EAP-TLS authentication protocol supports session key establishment Network Security (WS 2002): 10 Link Layer Security Protocols 23
24 Point to Point Tunneling Protocol (PPTP)! PPP was originally designed to be run between directly connected entities, that is entities which share a layer-2 connection! Example: a PC and a dialup-router of an Internet service provider connected over the telephone network using modems! The basic idea of PPTP is to extend the protocol s reach over the entire Internet by defining transport of PPP PDUs in IP packets! Thus, the payload of PPTP PDUs are PPP packets (without layer-2 specific fields like HDLC flags, bit insertion, control characters, CRC error check values, etc.)! PPP packets are encapsulated in GRE packets (generic routing encapsulation) that themselves are encapsulated in IP packets: Media Header (e.g. Ethernet MAC header) IP Header GRE V.2 Header PPP Packet Network Security (WS 2002): 10 Link Layer Security Protocols 24
25 PPTP: Voluntary vs. Compulsory Tunneling! PPTP realizes a tunnel over the Internet that carries PPP packets! Such a tunnel can be realized between different entities:! A client PC and a PPTP Remote Access Server (RAS): This is also referred to as voluntary tunneling, as the client PC is actively participating in the PPTP processing This variant allows to support secure communication between a client PC and a specific subnetwork using any access and intermediate network(s)! An ISP s Point of Presence (POP) and a PPTP Remote Access Server: This is also referred to as compulsory tunneling, as the client PC is not involved in the decision whether PPTP will be used or not This allows to realize security on the subnetwork level but does not realize true end-to-end security between the client PC and the RAS In compulsory tunneling the ISP POP acts as a proxy client to the RAS Network Security (WS 2002): 10 Link Layer Security Protocols 25
26 PPTP: Compulsory Tunneling Protocol Layers Client ISP POP PPTP-Tunnel PPTP RAS Application Server Internet IP / IPX / NetBEUI packet flow PPP PPTP IP / IPX / NetBEUI PPP PPP Framing (e.g. HDLC) Physical Layer IP / IPX / NetBEUI PPP GRE Version 2 IP Layer 2 Physical Layer IP / IPX / NetBEUI Layer 2 (e.g. 802.x) Physical Layer Network Security (WS 2002): 10 Link Layer Security Protocols 26
27 PPTP: Voluntary Tunneling Protocol Layers Client ISP POP PPTP-Tunnel PPTP RAS Application Server Internet IP / IPX / NetBEUI packet flow PPP PPTP IP / IPX / NetBEUI PPP GRE Version 2 IP PPP PPP Framing (HDLC) Physical Layer IP / IPX / NetBEUI PPP GRE Version 2 IP Layer 2 Physical Layer IP / IPX / NetBEUI Layer 2 (e.g. 802.x) Physical Layer Network Security (WS 2002): 10 Link Layer Security Protocols 27
28 PPTP: Voluntary Tunneling Packet Construction at Client Application User Data TCP/IP Stack IP TCP/UDP User Data PPTP Software GRE PPP IP TCP/UDP User Data TCP/IP Stack IP GRE PPP IP TCP/UDP User Data PPP Device Driver PPP Framing PPP IP GRE PPP IP TCP/UDP User Data Network Security (WS 2002): 10 Link Layer Security Protocols 28
29 PPTP / PPP Proprietary Extensions & Some History! PPTP has been largely deployed as a consequence of Microsoft s support for it:! It has been developed with Microsoft s active involvement and is documented in [RFC2637]! Microsoft implemented it as a part of its Remote Access Service (RAS)! Microsoft further specified proprietary extensions for PPP:! Microsoft PPP CHAP Extensions [RFC2433]! Microsoft Point to Point Encryption Protocol [RFC3078]! However, a series of vulnerabilities have been discovered in PPTP version 1 and also in an improved version 2 [SM98a, SMW99a]:! A general consensus to adopt PPTP as a standard protocol could not be reached in the IETF working groups! Furthermore, a similar protocol (Layer 2 Forwarding, L2F) had been proposed by Cisco as a competing approach! As a consequence, a compromise was found to merge the advantages of both proposals into one single protocol Layer 2 Tunneling Protocol (L2TP) Network Security (WS 2002): 10 Link Layer Security Protocols 29
30 Comparison of PPTP and L2TP! Both protocols:! use PPP to provide an initial envelope for user packets! extend the PPP model by allowing the layer-2 and the PPP endpoints to reside on different devices! support voluntary and compulsory tunneling! Underlying network:! PPTP requires an IP network to transport its PDUs! L2TP supports different technologies: IP (using UDP), Frame Relay permanent virtual circuits (PVCs), X.25 virtual circuits (VCs), or ATM VCs! PPTP can only support a single tunnel between end points, L2TP allows for the use of multiple tunnels between end points! E.g. L2TP allows to create different tunnels for different qualities of service! Both protocols provide for header compression:! With header compression L2TP operates with 4 bytes of overhead, as compared to 6 bytes for PPTP! L2TP provides for tunnel authentication, while PPTP does not Network Security (WS 2002): 10 Link Layer Security Protocols 30
31 Virtual Private Networks! Various definitions of the term virtual private network (VPN):! A private network constructed within a public network infrastructure, such as the global Internet! A communications environment in which access is controlled to permit peer connections only within a defined community of interest, and is constructed through some form of partitioning of a common underlying communications medium, where this underlying communications medium provides services to the network on a non-exclusive basis! A restricted-use, logical computer network that is constructed from the system resources of a relatively public, physical network (such as the Internet), often by using encryption, and often by tunneling links of the virtual network across the real network [RFC2828]! Remark: the later two definitions explicitly incorporate security properties (controlled access, encryption) while the first one does not Sure, it s a lot cheaper than using your own frame relay connections, but it works about as well as sticking cotton in your ears in Times Square and pretending nobody else is around. (Wired Magazine Feb. 1998) Network Security (WS 2002): 10 Link Layer Security Protocols 31
32 Techniques for building Virtual Private Networks! Make use of dedicated links (cut-through mechanisms):! ATM or Frame Relay virtual connections! Multi-Protocol Over ATM (MPOA)! Multi-Protocol Label Switching (MPLS)! Security services for link layer VPNs might efficiently be realized in the link layer protocol; one example is the ATM Security Specification [ATM99a]! Controlled route leaking / route filtering:! Basic idea: control route propagation to the point that only certain networks receive routes for other networks! This intends to realize security by obscurity! Tunneling:! Generic routing encapsulation (GRE)! PPP / PPTP / L2TP! IPSec Security Architecture for the Internet Protocol (see next chapter) Network Security (WS 2002): 10 Link Layer Security Protocols 32
33 Additional References (1) [IEEE01a] IEEE. Standards for Local and Metropolitan Area Networks: Standard for Port Based Network Access Control. IEEE Draft P802.1X/D11, [RFC1661] W. Simpson. The Point-to-Point Protocol (PPP). RFC 1661, [RFC1968] G. Meyer. The PPP Encryption Control Protocol (ECP). RFC 1968, [RFC1994] W. Simpson. PPP Challenge Handshake Authentication Protocol (CHAP). RFC 1994 (obsoletes RFC 1334), [RFC2284] L. Blunk, J. Vollbrecht. PPP Extensible Authentication Protocol (EAP). RFC 2284, [RFC2289] N. Haller, C. Metz, P. Nesser, M. Straw. A One-Time Password System. RFC 2289, [RFC2341] A. Valencia, M. Littlewood, T. Kolar. Cisco Layer Two Forwarding Protocol (L2F). RFC 2341, [RFC2419] K. Sklower, G. Meyer. The PPP DES Encryption Protocol, Version 2 (DESEbis). RFC 2419 (obsoletes RFC 1969), [RFC2420] H. Kummert. The PPP Triple-DES Encryption Protocol (3DESE). RFC 2420, [RFC2433] G. Zorn, S. Cobb. Microsoft PPP CHAP Extensions. RFC 2433, [RFC2637] K. Hamzeh, G. Pall, W. Verthein, J. Taarud, W. Little, G. Zorn. Point-to-Point Tunneling Protocol (PPTP). RFC 2637, Network Security (WS 2002): 10 Link Layer Security Protocols 33
34 Additional References (2) [RFC2661] W. Townsley, A. Valencia, A. Rubens, G. Pall, G. Zorn, B. Palter. Layer Two Tunneling Protocol (L2TP). RFC 2661, [RFC2828] R. Shirey. Internet Security Glossary. RFC 2828, [RFC3078] G. Pall, G. Zorn. Microsoft Point to Point Encryption Protocol (MPPE). RFC 3078, [SM98a] B. Schneier, Mudge. Cryptanalysis of Microsoft s Point-to-Point Tunneling Protocol (PPTP). Proceedings of the 5th ACM Conference on Communications and Computer Security, ACM Press, pp , [SMW99a] B. Schneier, Mudge, D. Wagner. Cryptanalysis of Microsoft's PPTP Authentication Extensions (MSCHAPv2). Counterpane Systems, [FH98a] P. Ferguson, G. Huston. What is a VPN? The Internet Protocol Journal, volume 1, no. 1&2, Cisco Systems [ATM99a] ATM Forum. ATM Security Specification Version 1.0. AF-SEC , February, Network Security (WS 2002): 10 Link Layer Security Protocols 34
Chapter 10 Security Protocols of the Data Link Layer
Chapter 10 Security Protocols of the Data Link Layer IEEE 802.1x Point-to-Point Protocol (PPP) Point-to-Point Tunneling Protocol (PPTP) [NetSec], WS 2006/2007 10.1 Scope of Link Layer Security Protocols
Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer
Other VPNs TLS/SSL, PPTP, L2TP Advanced Computer Networks SS2005 Jürgen Häuselhofer Overview Introduction to VPNs Why using VPNs What are VPNs VPN technologies... TLS/SSL Layer 2 VPNs (PPTP, L2TP, L2TP/IPSec)
Cisco Which VPN Solution is Right for You?
Table of Contents Which VPN Solution is Right for You?...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 NAT...2 Generic Routing Encapsulation Tunneling...2
VPN. Date: 4/15/2004 By: Heena Patel Email:[email protected]
VPN Date: 4/15/2004 By: Heena Patel Email:[email protected] What is VPN? A VPN (virtual private network) is a private data network that uses public telecommunicating infrastructure (Internet), maintaining
7.1. Remote Access Connection
7.1. Remote Access Connection When a client uses a dial up connection, it connects to the remote access server across the telephone system. Windows client and server operating systems use the Point to
Chapter 4: Security of the architecture, and lower layer security (network security) 1
Chapter 4: Security of the architecture, and lower layer security (network security) 1 Outline Security of the architecture Access control Lower layer security Data link layer VPN access Wireless access
Application Note: Onsight Device VPN Configuration V1.1
Application Note: Onsight Device VPN Configuration V1.1 Table of Contents OVERVIEW 2 1 SUPPORTED VPN TYPES 2 1.1 OD VPN CLIENT 2 1.2 SUPPORTED PROTOCOLS AND CONFIGURATION 2 2 OD VPN CONFIGURATION 2 2.1
CS 393/682 Network Security. Nasir Memon Polytechnic University Module 7 Virtual Private Networks
CS 393/682 Network Security Nasir Memon Polytechnic University Module 7 Virtual Private Networks Course Logistics Midterm next week. Old exams posted Brief review at end of this module HW 4 assigned, due
Data Link Protocols. TCP/IP Suite and OSI Reference Model
Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite
PPP (Point-to-Point Protocol)
PPP (Point-to-Point Protocol) PPP (Point-to-Point Protocol) is the most widely used method for transporting IP packets over a serial link between the user and the Internet Service Provider (ISP). Although
VPN SECURITY. February 2008. The Government of the Hong Kong Special Administrative Region
VPN SECURITY February 2008 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw
IP Security IPSec, PPTP, OpenVPN Pawel Cieplinski, AkademiaWIFI.pl MUM Wroclaw Introduction www.akademiawifi.pl WCNG - Wireless Network Consulting Group We are group of experienced professionals. Our company
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
Firewalls and Virtual Private Networks
CHAPTER 9 Firewalls and Virtual Private Networks Introduction In Chapter 8, we discussed the issue of security in remote access networks. In this chapter we will consider how security is applied in remote
SLIP and PPP. Gursharan Singh Tatla. [email protected] www.eazynotes.com. 1 www.eazynotes.com
SLIP and PPP Gursharan Singh Tatla [email protected] 1 Data Link Layer in Internet We know that Internet consists of individual systems that are connected to each other. Basically, it is wide are
DSL Forum Technical Report TR-045. PPP Static Interoperability Testing
DSL Forum Technical Report TR-045 (Formerly WT-052v8) PPP Static Interoperability Testing March 2002 Abstract: This document addresses static interoperability testing for the higher protocol layers running
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected]. 2006 Cisco Systems, Inc. All rights reserved.
Cisco Secure ACS Overview By Igor Koudashev, Systems Engineer, Cisco Systems Australia [email protected] 2006 Cisco Systems, Inc. All rights reserved. 1 Cisco Secure Access Control System Policy Control and
High-Level Data Link Control
High-Level Data Link Control This class of data link layer protocols includes High-level Data Link Control (HDLC), Link Access Procedure Balanced (LAPB) for X.25, Link Access Procedure for D-channel (LAPD)
Connecting Remote Users to Your Network with Windows Server 2003
Connecting Remote Users to Your Network with Windows Server 2003 Microsoft Corporation Published: March 2003 Abstract Business professionals today require access to information on their network from anywhere
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Data Link Protocols. 5.4 Framing
Data Link Protocols A Packets Data link layer Physical layer Frames Packets Data link layer Physical layer B Data Links Services Framing Error control Flow control Multiplexing Link Maintenance Security:
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls
Overview VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls Computer Net Lab/Praktikum Datenverarbeitung 2 1 VPN - Definition VPNs (Virtual Private Networks) allow secure data transmission
"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
Intranet Security Solution
Intranet Security Solution 1. Introduction With the increase in information and economic exchange, there are more and more enterprises need to communicate with their partners, suppliers, customers or their
Overview. Protocols. VPN and Firewalls
Computer Network Lab 2015 Fachgebiet Technische h Informatik, Joachim Zumbrägel Overview VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls VPN-Definition VPNs (Virtual Private Networks)
Virtual Private Network and Remote Access Setup
CHAPTER 10 Virtual Private Network and Remote Access Setup 10.1 Introduction A Virtual Private Network (VPN) is the extension of a private network that encompasses links across shared or public networks
DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0
DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
Site to Site Virtual Private Networks (VPNs):
Site to Site Virtual Private Networks Programme NPFIT DOCUMENT RECORD ID KEY Sub-Prog / Project Information Governance NPFIT-FNT-TO-IG-GPG-0002.01 Prog. Director Mark Ferrar Owner Tim Davis Version 1.0
APNIC elearning: IPSec Basics. Contact: [email protected]. esec03_v1.0
APNIC elearning: IPSec Basics Contact: [email protected] esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs
: Computer Networks Lecture 9: Mar 30, 2005 VPNs VPN Taxonomy VPN Client Network Provider-based Customer-based Provider-based Customer-based Compulsory Voluntary L2 L3 Secure Non-secure ATM Frame Relay
How To Learn Cisco Cisco Ios And Cisco Vlan
Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led
INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
Chapter 2 - The TCP/IP and OSI Networking Models
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
Windows Server 2003 Remote Access Overview
Windows Server 2003 Remote Access Overview Microsoft Corporation Published: March 2003 Abstract Remote access allows users with remote computers to create a logical connection to an organization network
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
AN OVERVIEW OF REMOTE ACCESS VPNS: ARCHITECTURE AND EFFICIENT INSTALLATION
AN OVERVIEW OF REMOTE ACCESS VPNS: ARCHITECTURE AND EFFICIENT INSTALLATION DR. P. RAJAMOHAN SENIOR LECTURER, SCHOOL OF INFORMATION TECHNOLOGY, SEGi UNIVERSITY, TAMAN SAINS SELANGOR, KOTA DAMANSARA, PJU
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Virtual Private Networks
Virtual Private Networks The Ohio State University Columbus, OH 43210 [email protected] http://www.cse.ohio-state.edu/~jain/ 1 Overview Types of VPNs When and why VPN? VPN Design Issues Security
Creating a VPN Using Windows 2003 Server and XP Professional
Creating a VPN Using Windows 2003 Server and XP Professional Recommended Instructor Preparation for Learning Activity Instructor Notes: There are two main types of VPNs: User-to-Network This type of VPN
How To Create A Virtual Network With A Router And Network Operating System (Ip) For A Network (Ipv) (Ip V2) (Netv) And A Virtualization) (Network) (Wired) (Virtual) (Wire)
Post-IP technologies virtualization and security Guy Pujolle 1 Virtualization for a post-ip network 2 Geni Intel would like to propose a generic router Intel proposes to have a generic hardware with virtual
Virtual Private Networks: IPSec vs. SSL
Virtual Private Networks: IPSec vs. SSL IPSec SSL Michael Daye Jr. Instructor: Dr. Lunsford ICTN 4040-001 April 16 th 2007 Virtual Private Networks: IPSec vs. SSL In today s society organizations and companies
Lecture 3. WPA and 802.11i
Lecture 3 WPA and 802.11i Lecture 3 WPA and 802.11i 1. Basic principles of 802.11i and WPA 2. IEEE 802.1X 3. Extensible Authentication Protocol 4. RADIUS 5. Efficient Handover Authentication 1 Lecture
Technical papers Virtual private networks
Technical papers Virtual private networks This document has now been archived Virtual private networks Contents Introduction What is a VPN? What does the term virtual private network really mean? What
VPN. VPN For BIPAC 741/743GE
VPN For BIPAC 741/743GE August, 2003 1 The router supports VPN to establish secure, end-to-end private network connections over a public networking infrastructure. There are two types of VPN connections,
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
VIRTUAL PRIVATE NETWORKS: SECURE REMOTE ACCESS OVER THE INTERNET
51-10-38 DATA COMMUNICATIONS MANAGEMENT VIRTUAL PRIVATE NETWORKS: SECURE REMOTE ACCESS OVER THE INTERNET John R. Vacca INSIDE Remote User Access over the Internet; Connecting Networks over the Internet;
Post-Class Quiz: Telecommunication & Network Security Domain
1. What type of network is more likely to include Frame Relay, Switched Multi-megabit Data Services (SMDS), and X.25? A. Local area network (LAN) B. Wide area network (WAN) C. Intranet D. Internet 2. Which
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide
Network Security [2] Public Key Encryption Also used in message authentication & key distribution Based on mathematical algorithms, not only on operations over bit patterns (as conventional) => much overhead
Virtual Private Networks
Virtual Private Networks Rene Bahena Felipe Flores COEN 150 Project Report Chapter 1: What is a VPN? VPN stands for Virtual Private Network and is a way of making a secure remote connection to a private
VPN Solutions. Lesson 10. etoken Certification Course. April 2004
VPN Solutions Lesson 10 April 2004 etoken Certification Course VPN Overview Lesson 10a April 2004 etoken Certification Course Virtual Private Network A Virtual Private Network (VPN) is a private data network
Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References
Lecture Objectives Wireless Networks and Mobile Systems Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks Introduce security vulnerabilities and defenses Describe security functions
WAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
CTS2134 Introduction to Networking. Module 07: Wide Area Networks
CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data
Network Access Control and Cloud Security
Network Access Control and Cloud Security Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-14/
Network Security. Lecture 3
Network Security Lecture 3 Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Security protocols application transport network datalink physical Contents IPSec overview
Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services
ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Objectives Providing Teleworker Services Describe the enterprise requirements for providing teleworker services Explain how
PPP encapsulation has been carefully designed to retain compatibility with most commonly used supporting hardware. PPP encapsulates data frames for
PPP Concept 1 What is PPP? Recall that HDLC is the default serial encapsulation method when you connect two Cisco routers. With an added protocol type field, the Cisco version of HDLC is proprietary. Thus,
The 802.1x specification
The 802.1x specification Fulvio Risso Politecnico di Torino Based on an existing presentation of Piero Nicoletti 1 IEEE 802.1x Port-Based Network Access Control Use physical access characteristics of IEEE
The next generation of knowledge and expertise Wireless Security Basics
The next generation of knowledge and expertise Wireless Security Basics HTA Technology Security Consulting., 30 S. Wacker Dr, 22 nd Floor, Chicago, IL 60606, 708-862-6348 (voice), 708-868-2404 (fax), www.hta-inc.com
Chapter 10. Network Security
Chapter 10 Network Security 10.1. Chapter 10: Outline 10.1 INTRODUCTION 10.2 CONFIDENTIALITY 10.3 OTHER ASPECTS OF SECURITY 10.4 INTERNET SECURITY 10.5 FIREWALLS 10.2 Chapter 10: Objective We introduce
ERserver. iseries. Remote Access Services: PPP connections
ERserver iseries Remote Access Services: PPP connections ERserver iseries Remote Access Services: PPP connections Copyright International Business Machines Corporation 1998, 2002. All rights reserved.
Authentication and Security in IP based Multi Hop Networks
7TH WWRF MEETING IN EINDHOVEN, THE NETHERLANDS 3RD - 4TH DECEMBER 2002 1 Authentication and Security in IP based Multi Hop Networks Frank Fitzek, Andreas Köpsel, Patrick Seeling Abstract Network security
Virtual Private Networks
Virtual Private Networks ECE 4886 Internetwork Security Dr. Henry Owen Definition Virtual Private Network VPN! Virtual separation in protocol provides a virtual network using no new hardware! Private communication
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
Extensible Authentication Protocol (EAP) Security Issues
Sotillo ECU 1 Extensible Authentication Protocol (EAP) Security Issues Samuel Sotillo, Dept. of Technology Systems, East Carolina University Abstract This document describes the Extensible Authentication
Certficate Extensions and Attributes Supporting Authentication in PPP and Wireless LAN. Daniel Schwarz
Certficate Extensions and Attributes Supporting Authentication in PPP and Wireless LAN Daniel Schwarz Overview: 1. Introduction I. PKIX 2. Basics I. PPP II. EAP III. 802.1x IV. X.509 certificate extensions
Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.
Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources
Network Security 1 Module 4 Trust and Identity Technology
Network Security 1 Module 4 Trust and Identity Technology 1 Learning Objectives 4.1 AAA 4.2 Authentication Technologies 4.3 Identity Based Networking Services (IBNS) 4.4 Network Admission Control (NAC)
Broadband Service Architecture for Access to Legacy Data Networks over ADSL Issue 1
Technical Report TR-012 Broadband Service Architecture for Access to Legacy Data s over ADSL Issue 1 June 1998 Abstract: This Technical Report specifies an interoperable end-to-end architecture to support
Introduction to Security and PIX Firewall
Introduction to Security and PIX Firewall Agenda Dag 28 Föreläsning LAB PIX Firewall VPN A Virtual Private Network (VPN) is a service offering secure, reliable connectivity over a shared, public network
Security. Contents. S-72.3240 Wireless Personal, Local, Metropolitan, and Wide Area Networks 1
Contents Security requirements Public key cryptography Key agreement/transport schemes Man-in-the-middle attack vulnerability Encryption. digital signature, hash, certification Complete security solutions
Virtual Private Network and Remote Access
Virtual Private Network and Remote Access Introduction A virtual private network (VPN) is the extension of a private network that encompasses links across shared or public networks like the Internet. A
Chapter 12 Supporting Network Address Translation (NAT)
[Previous] [Next] Chapter 12 Supporting Network Address Translation (NAT) About This Chapter Network address translation (NAT) is a protocol that allows a network with private addresses to access information
MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb
MP PLS VPN MPLS VPN Prepared by Eng. Hussein M. Harb Agenda MP PLS VPN Why VPN VPN Definition VPN Categories VPN Implementations VPN Models MPLS VPN Types L3 MPLS VPN L2 MPLS VPN Why VPN? VPNs were developed
Security (II) ISO 7498-2: Security Architecture of OSI Reference Model. Outline. Course Outline: Fundamental Topics. EE5723/EE4723 Spring 2012
Course Outline: Fundamental Topics System View of Network Security Network Security Model Security Threat Model & Security Services Model Overview of Network Security Security Basis: Cryptography Secret
Authentication, Authorization and Accounting (AAA) Protocols
Authentication, Authorization and Accounting (AAA) Protocols Agententechnologien in der Telekommunikation Sommersemester 2009 Babak Shafieian [email protected] 10.06.2009 Agententechnologien
Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU
UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU ITMS: 26140230008 DOPYTOVO ORIENTOVANÝ PROJEKT Moderné
This chapter describes how to set up and manage VPN service in Mac OS X Server.
6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure
How To Understand And Understand The Security Of A Key Infrastructure
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 12 Applying Cryptography Objectives Define digital certificates List the various types of digital certificates and how they are used
Virtual Private Networks (VPN) VPN. Agenda. Classical VPN s
Virtual Private Networks (VPN) VPN Virtual Private Networks Introduction VPDN Details (L2F, PPTP, L2TP) old idea private networks of different customers can share a single WAN infrastructure since 1980
How Virtual Private Networks Work
How Virtual Private Networks Work by Jeff Tyson This article has been reprinted from http://computer.howstuffworks.com/ Please note that the web site includes two animated diagrams which explain in greater
CSE 3461 / 5461: Computer Networking & Internet Technologies
Autumn Semester 2014 CSE 3461 / 5461: Computer Networking & Internet Technologies Instructor: Prof. Kannan Srinivasan 08/28/2014 Announcement Drop before Friday evening! k. srinivasan Presentation A 2
Internet Protocol Security IPSec
Internet Protocol Security IPSec Summer Semester 2011 Integrated Communication Systems Group Ilmenau University of Technology Outline Introduction Authentication Header (AH) Encapsulating Security Payload
CCNA Security 1.1 Instructional Resource
CCNA Security 1.1 Instructional Resource Chapter 8 Implementing Virtual Private Networks 2012 Cisco and/or its affiliates. All rights reserved. 1 Describe the purpose and types of VPNs and define where
A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform
A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform Peter Dulany, Chang Soo Kim, and James T. Yu [email protected], [email protected], [email protected] School of Computer Science,
11/22/2013 1. komwut@siit
11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)
MCTS Guide to Microsoft Windows 7. Chapter 14 Remote Access
MCTS Guide to Microsoft Windows 7 Chapter 14 Remote Access Objectives Understand remote access and remote control features in Windows 7 Understand virtual private networking features in Windows 7 Describe
Remote Access Security
Glen Doss Towson University Center for Applied Information Technology Remote Access Security I. Introduction Providing remote access to a network over the Internet has added an entirely new dimension to
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication Objectives Define authentication Describe the different types of authentication credentials List and explain the
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues
NCP Secure Entry Mac Client Service Release 2.05 Build 14711 December 2013 Prerequisites Apple OS X Operating System: The following Apple OS X operating system versions are supported with this release:
