VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls



Similar documents
Overview. Protocols. VPN and Firewalls

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Protocol Security Where?

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

VPN SECURITY. February The Government of the Hong Kong Special Administrative Region

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

CS 4803 Computer and Network Security

IP Security. Ola Flygt Växjö University, Sweden

Chapter 10. Network Security

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

Virtual Private Network and Remote Access Setup

VPN. VPN For BIPAC 741/743GE

Application Note: Onsight Device VPN Configuration V1.1

Cisco Which VPN Solution is Right for You?

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Chapter 32 Internet Security

Network Security. Lecture 3

Cornerstones of Security

Internet Privacy Options

Site to Site Virtual Private Networks (VPNs):

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Today s Topics SSL/TLS. Certification Authorities VPN. Server Certificates Client Certificates. Trust Registration Authorities

Implementing and Managing Security for Network Communications

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Intranet Security Solution

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services

Virtual Private Networks

Network Security Fundamentals

CS 393/682 Network Security. Nasir Memon Polytechnic University Module 7 Virtual Private Networks

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Reti Private Virtuali - VPN

Firewalls and Virtual Private Networks

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

VPN. Date: 4/15/2004 By: Heena Patel

Chapter 4: Security of the architecture, and lower layer security (network security) 1

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Virtual Private Network and Remote Access

Internetwork Security

GNAT Box VPN and VPN Client

IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers

AN OVERVIEW OF REMOTE ACCESS VPNS: ARCHITECTURE AND EFFICIENT INSTALLATION

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Understanding the Cisco VPN Client

VPN Solutions. Lesson 10. etoken Certification Course. April 2004

This chapter describes how to set up and manage VPN service in Mac OS X Server.

Introduction to Security and PIX Firewall

Lecture 17 - Network Security

Security Engineering Part III Network Security. Security Protocols (II): IPsec

Virtual Private Networks

Branch Office VPN Tunnels and Mobile VPN

Chapter 4 Virtual Private Networking

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Chapter 12 Supporting Network Address Translation (NAT)

21.4 Network Address Translation (NAT) NAT concept

Computer Networks. Secure Systems

Introduction. An Overview of the DX Industrial Router Product Line. IP router and firewall. Integrated WAN, Serial and LAN interfaces

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway

This section provides a summary of using network location profiles to identify network connection types. Details include:

Matrix Technical Support Mailer 167 NAVAN CNX200 PPTP VPN with Windows Client

Chapter 8 Network Security. Slides adapted from the book and Tomas Olovsson

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

Internet Protocol Security IPSec

Security vulnerabilities in the Internet and possible solutions

Chapter 9. IP Secure

Technical papers Virtual private networks

ISG50 Application Note Version 1.0 June, 2011

Introduction of Quidway SecPath 1000 Security Gateway

CS 356 Lecture 27 Internet Security Protocols. Spring 2013


Remote Connectivity for mysap.com Solutions over the Internet Technical Specification

Chapter 7 Transport-Level Security

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Network Access Security. Lesson 10

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

Firewalls. Outlines: By: Arash Habibi Lashkari July Network Security 06

Building scalable IPSec infrastructure with MikroTik. IPSec, L2TP/IPSec, OSPF

7.1. Remote Access Connection

How To Understand And Understand The Security Of A Key Infrastructure

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

Outline. INF3510 Information Security. Lecture 10: Communications Security. Communication Security Analogy. Network Security Concepts

VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Secure Remote Monitoring of the Critical System Infrastructure. An Application Note from the Experts in Business-Critical Continuity

Lecture 10: Communications Security

Joe Davies Principal Writer Windows Server Documentation

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

Chapter 8 Virtual Private Networking

Introduction to Computer Security

GPRS / 3G Services: VPN solutions supported

Securing IP Networks with Implementation of IPv6

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

Network Security Part II: Standards

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip

Transcription:

Overview VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls Computer Net Lab/Praktikum Datenverarbeitung 2 1

VPN - Definition VPNs (Virtual Private Networks) allow secure data transmission over insecure connection. VPNs connect computer and/or networks (on various locations) to a common network by use of public communication structures. Computer Net Lab/Praktikum Datenverarbeitung 2 2

VPN Scheme LAN LAN VPN-Tunnel VPN Internet VPN Client Client Computer Net Lab/Praktikum Datenverarbeitung 2 3

VPN - terms Virtual, due to the usage of a public communication infrastructure there is no permanent physical connection but a logical one. If there are some data to transmit then the bandwith is occupied and data is transmitted according the routing information. Private, because only valid users should have access to the network respectively the data. Additionally all data have to be transmitted confidential. Computer Net Lab/Praktikum Datenverarbeitung 2 4

VPN requirements Data security must ensure Confidentiality Integrity Authentication Quality of Service Guarantees availability of connectivity Support of all applications Additional requirements Reasonable administration effort Effectiveness and extendibility Computer Net Lab/Praktikum Datenverarbeitung 2 5

Confidentiality means that no unauthorized person, who got illegal access to data, is able to read respectively understand data. Is realized by encryption. The data are coded by an encryption algorithm and an encryption key. Only owner of the appropriate decryption key are able to decrypt the coded data. Computer Net Lab/Praktikum Datenverarbeitung 2 6

Integrity means that no data has been changed/manipulated during transmission. is realised by checksum of transferred data. By use of a mathematical function a checksum is build over the data which has to be transmitted. This checksum is unique. The checksum together with the data is sent to the recipient. Computer Net Lab/Praktikum Datenverarbeitung 2 7

Authentication means that a recipient of a message is able to ensure that he got the message from the right person and not from a person who pretend to be the right one. is realized by use of digital signatures. Digital signatures are like a normal signature in a document which unambiguously identifies the author. Computer Net Lab/Praktikum Datenverarbeitung 2 8

Symmetric Encryption Each communication partner has the same key N (N-1) keys, for N communication partner which communicate pair wise High effort for Key maintenance Key length with 128 Bit are said to be sure, typical values 40,56,128 Fast Method DES, Triple DES, Blowfish Computer Net Lab/Praktikum Datenverarbeitung 2 9

Asymmetric Encryption Distinction between private (my) and public keys (for others) Communication with N participants means N public keys Key length higher than symetric keys typical length: 512,1024,2048 Slower than symmetric encryption Example: PGP, RSA Computer Net Lab/Praktikum Datenverarbeitung 2 10

Tunnel Tunneling means the embedding of a complete data package (header and payload) within the payload segment of an other protocol in the same protocol level. Advantage: Data can be coded/encrypted Orig IP Hdr TCP Hdr Data New IP Hdr Orig IP Hdr TCP Hdr Data Computer Net Lab/Praktikum Datenverarbeitung 2 11

End-to to-end Constellation Internet Computer 1 Computer 2 Computer Net Lab/Praktikum Datenverarbeitung 2 12

End-to to-site Constellation ISP Dial-up mobile computer Internet Intranet VPN Gateway ISP Dial-up mobile computer Computer Net Lab/Praktikum Datenverarbeitung 2 13

Site-to to-site Constellation Intranet 1 Intranet 2 Internet VPN Gateway 1 VPN Gateway 2 Computer Net Lab/Praktikum Datenverarbeitung 2 14

VPN-Types Application-Layer encryption Applicationlevel (Layer 5-7) Transport-/ network level (Layer 3-4) Network-Layer encryption Link-/ physical level (Layer 1-2) Link-Layer encryption Link-Layer encryption Computer Net Lab/Praktikum Datenverarbeitung 2 15

VPN and ISO/OSI Layer Application Transport Network Link SSH, Kerberos, Virusscans, Content Screening, IPSEC (IKE) SSL, Socks V5, TLS IPSEC (AH, ESP), Paket Filtering, NAT Tunneling Protocols (L2TP, PPTP, L2F), CHAP, PAP, Computer Net Lab/Praktikum Datenverarbeitung 2 16

PPTP-Protocol Protocol Point To Point Tunneling, widespread because simple Layer-2 Protocol Only user authentification => Security = Password Set up of communication: 1. PPP connection with user Authentification 2. Link and control (TCP Port 1723) IP- GRE (IP 47) PPP 3. Tunnel: PPP Payload Header Header Header IP-Adresses Client+Server, => NAT and dynam. IP-Adresses ok opt. with MPPE (RC4) encrypted Computer Net Lab/Praktikum Datenverarbeitung 2 17

PPTP-Protocol Protocol 2 Computer Net Lab/Praktikum Datenverarbeitung 2 18

IPSec 1 Internet Protocol Security is a protocol family Allows encryption and integrity check integrity check (Authentication Header Protocol): encryption (Encapsulating Security Payload Protocol): Open for enhancements, encryption method is not fixed Authentification: Diffie-Hellmann key exchange confidentiality: Triple,-DES, IDEA, Blowfish Integrity by use of Hash building: MD5 und SHA Two mode of operation modes Tunnel mode protects address information and payload Transport mode protects only payload Computer Net Lab/Praktikum Datenverarbeitung 2 19

IPSec AH AH allows only check of integrity Original packet: Orig IP Hdr TCP Hdr Data Tunnel mode: Transport mode: New IP Hdr AH Header Orig IP Hdr TCP Hdr Data Orig IP Hdr AH Header TCP Hdr Data Computer Net Lab/Praktikum Datenverarbeitung 2 20

IPSec ESP ESP allows encryption Original packet: Orig IP Hdr TCP Hdr Data Tunnel mode: New IP Hdr ESP Hdr Orig ESP Trailer ESP Auth Transport mode: Orig IP Hdr ESP Hdr TCP Hdr Data ESP Trailer ESP Auth Computer Net Lab/Praktikum Datenverarbeitung 2 21

VPN and Firewall Idea of the Firewall The Firewall is the only connection to the Internet. All other computers (even the VPN-Gateway) are located behind the Firewall. Problem The firewall ist not able to analyze the data because they are encrypted. Computer Net Lab/Praktikum Datenverarbeitung 2 22

VPN behind Firewall LAN (center) VPN-Gateway LAN (branch office) decrypted Data VPN Internet Firewall VPN Client Computer Net Lab/Praktikum Datenverarbeitung 2 23

VPN and Firewall together LAN (center) Firewall and VPN-Gateway LAN (branch office) decrypted Daten VPN Internet VPN Client Computer Net Lab/Praktikum Datenverarbeitung 2 24

VPN Gateway in DMZ LAN (center) VPN-Gateway DMZ LAN (branch office) decrypted Daten Internet VPN Internet inner Firewall outer Firewall VPN client Computer Net Lab/Praktikum Datenverarbeitung 2 25

NAT Nat = Network Adress Translation Allows through mapping the assignment of official IP-Addresses to private one. Therefore it is possible to gain access to the internet with private IP-Addresses. Sender-IP 192.168.0.10 New Sender-IP 134.91.90.70 Webbrowser New Target-IP 192.168.0.10 Target-IP 134.91.90.70 NAT Internet Computer Net Lab/Praktikum Datenverarbeitung 2 26

IP It carries the transport protocols TCP and UDP. It builds IP-Packages out of the data which have to be transmitted. It adds additional information, the IP-Header. It contains source and destination address. Computer Net Lab/Praktikum Datenverarbeitung 2 27

TCP TCP (Transmission Control Protocol) confirms every received data package. TCP repeats each data package until its receiving is confirmed. TCP is reliable, that means the transmission is guaranteed. 32 BIT Computer Net Lab/Praktikum Datenverarbeitung 2 28

IP-Forwarding VPN Gateway Firewall private, local Net IP-Paket with target: 192.168.1.1 IP-Forwarding IP-Paket with Target: 134.91.90.70 Port 1723 or Gre-Protocol 47 Computer Net Lab/Praktikum Datenverarbeitung 2 29

VPN-Practical Practical training Firewall Firewall Internet VPN-Gateway VPN-Gateway private, local net =Tunnel private, local net Computer Net Lab/Praktikum Datenverarbeitung 2 30