Overview. Protocols. VPN and Firewalls



Similar documents
VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Protocol Security Where?

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

CS 4803 Computer and Network Security

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Cisco Which VPN Solution is Right for You?

Virtual Private Network and Remote Access Setup

VPN SECURITY. February The Government of the Hong Kong Special Administrative Region

Network Security. Lecture 3

Application Note: Onsight Device VPN Configuration V1.1

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

IP Security. Ola Flygt Växjö University, Sweden

Implementing and Managing Security for Network Communications

VPN. VPN For BIPAC 741/743GE

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Chapter 10. Network Security

Internet Privacy Options

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Network Security Fundamentals

Chapter 4: Security of the architecture, and lower layer security (network security) 1

Security Engineering Part III Network Security. Security Protocols (II): IPsec

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

Firewalls and Virtual Private Networks

GNAT Box VPN and VPN Client

Intranet Security Solution

Chapter 32 Internet Security

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

Lecture 17 - Network Security

IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers

Virtual Private Networks

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

This section provides a summary of using network location profiles to identify network connection types. Details include:

Internetwork Security

Today s Topics SSL/TLS. Certification Authorities VPN. Server Certificates Client Certificates. Trust Registration Authorities

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Internet Protocol Security IPSec

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services

Fireware How To VPN. Introduction. Is there anything I need to know before I start? Configuring a BOVPN Gateway

Virtual Private Network and Remote Access

This chapter describes how to set up and manage VPN service in Mac OS X Server.

CS 393/682 Network Security. Nasir Memon Polytechnic University Module 7 Virtual Private Networks

Site to Site Virtual Private Networks (VPNs):

Cornerstones of Security

Virtual Private Networks

Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1

21.4 Network Address Translation (NAT) NAT concept

Understanding the Cisco VPN Client

Reti Private Virtuali - VPN

VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert

AN OVERVIEW OF REMOTE ACCESS VPNS: ARCHITECTURE AND EFFICIENT INSTALLATION

ISG50 Application Note Version 1.0 June, 2011

VPN. Date: 4/15/2004 By: Heena Patel

Introduction to Security and PIX Firewall

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Branch Office VPN Tunnels and Mobile VPN

Chapter 4 Virtual Private Networking

Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku

Computer Networks. Secure Systems

Chapter 12 Supporting Network Address Translation (NAT)

Building scalable IPSec infrastructure with MikroTik. IPSec, L2TP/IPSec, OSPF

VPN Solutions. Lesson 10. etoken Certification Course. April 2004

Introduction. An Overview of the DX Industrial Router Product Line. IP router and firewall. Integrated WAN, Serial and LAN interfaces

Introduction of Quidway SecPath 1000 Security Gateway

The BANDIT Products in Virtual Private Networks

Remote Connectivity for mysap.com Solutions over the Internet Technical Specification

Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

LinkProof And VPN Load Balancing

Security vulnerabilities in the Internet and possible solutions

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

7.1. Remote Access Connection

Matrix Technical Support Mailer 167 NAVAN CNX200 PPTP VPN with Windows Client

Network Security. Marcus Bendtsen Institutionen för Datavetenskap (IDA) Avdelningen för Databas- och Informationsteknik (ADIT)

LECTURE 4 NETWORK INFRASTRUCTURE

Introduction to Computer Security

MINI-FAQ: OpenBSD 2.4 IPSEC VPN Configuration

Chapter 8 Virtual Private Networking

GPRS / 3G Services: VPN solutions supported

Chapter 7 Transport-Level Security

Introduction to Computer Security

Table of Contents. 1 Overview 1-1 Introduction 1-1 Product Design 1-1 Appearance 1-2

How to configure VPN function on TP-LINK Routers

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

How To Understand And Understand The Security Of A Key Infrastructure

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip

Introduction to Network Security. 1. Introduction. And People Eager to Take Advantage of the Vulnerabilities

FortiOS Handbook IPsec VPN for FortiOS 5.0

Network Access Security. Lesson 10


How to configure VPN function on TP-LINK Routers

Network Security and Firewall 1

Chapter 37. Secure Networks

Final exam review, Fall 2005 FSU (CIS-5357) Network Security

Chapter 8 Network Security. Slides adapted from the book and Tomas Olovsson

Transcription:

Computer Network Lab 2015 Fachgebiet Technische h Informatik, Joachim Zumbrägel

Overview VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls

VPN-Definition VPNs (Virtual Private Networks) allow secure data transmission over insecure connections. VPNs connect computers and/or networks (on various locations) to a common network by use of public communication structures.

VPN Scheme LAN LAN VPN-Tunnel VPN Internet VPN Client Client

VPN terms Virtual: due to the usage of a public communication infrastructure there is no permanent physical connection but a logical one. Private: because only valid users should have access to the network respectively the data. Additionally all data have to be transmitted confidential.

VPN requirements Data security must ensure Confidentiality Integrity Authentication Quality of Service Guarantees availability of connectivity Support of all applications Additional requirements Reasonable administration effort Effectiveness and extendibility

Confidentiality means that no unauthorized person, who got illegal access to data, is able to read respectively understand data. is realized by encryption. The data are coded d by an encryption algorithm and an encryption key. Only owner of the appropriate decryption key are able to decrypt the coded data.

Integrity means that no data has been changed/manipulated during transmission. is realised by checksum of transferred data. By use of a mathematical function a checksum is build over the data which has to be transmitted. This checksum is unique. The checksum together with the data is sent to the recipient.

Authentication means that a recipient of a message is able to ensure that he got the message from the right person and not from a person who pretend to be the right one. is realized by use of digital signatures. Digital signatures are like a normal signature in a document which unambiguously identifies the author.

Symetric encryption Each communication partner has the same key N (N-1)/2 keys, for N communication partner which h communicate pair wise High effort for Key maintenance Key length with 128 Bit are said to be sure, typical values 40,56,128 Fast Method DES, Triple DES, Blowfish

Asymetric encryption Distinction between private (my) and public keys (for others) Communication with N participants i t means N public keys Key length higher than symetric keys typical length: 512,1024,2048, Slower than symmetric encryption Example: PGP, RSA

Tunnel Tunneling means the embedding of a complete data package (header and payload) within the payload segment of an other protocol in the same protocol level. Advantage: Data can be coded/encrypted Orig IP Hdr TCP Hdr Data New IP Hdr Oi Orig IPHdr TCP Hdr Data

End-To-End-Constellation Internet Computer 1 Computer 2

End-To-Site-Constellation mobile computer Internet Intranet VPN Gateway

Site-To-Site-Constellation Intranet 1 Intranet 2 Internet VPN Gateway 1 VPN Gateway 2

VPN and Network Layer Applicationlevel (Layer 5-7) Application-Layer encryption Transport-/ network level (Layer 3-4) Network-Layer encryption Link-/ physical level (Layer 1-2) Link-Layer encryption Link-Layer encryption

VPN and Network Layer (2) Application Transport Network Link SSH, Kerberos, Virusscans, Content Screening, IPSEC (IKE) SSL/TLS, Socks V5 IPSEC (AH, ESP), Paket Filtering, NAT Tunneling Protocols (L2TP, PPTP, L2F), CHAP, PAP,

PPTP-Protocol Point To Point Tunneling, widespread because simple Layer-2 Protocol Only user authentification => Security = Password Set up of communication: 1. PPP connection with user Authentification 2. Link and control (TCP Port 1723) IP- GRE (IP 47) PPP 3. Tunnel: PPP Payload Header Header Header IP-Adresses Client+Server, => NAT and dynam. IP-Adresses ok opt. with MPPE (RC4) encrypted

PPTP-Protocol 2

IPSec 1 Internet Protocol Security is a protocol family Allows encryption and integrity check integrity check (Authentication Header Protocol): encryption (Encapsulating Security Payload Protocol): Open for enhancements, encryption method not fixed Authentification: Diffie-Hellmann key exchange confidentiality: Triple,-DES, IDEA, Blowfish Integrity by use of Hash building: MD5 und SHA Two mode of operation modes Tunnel mode protects address information and payload Transport mode protects only payload

IPSec AH AH allows only check of integrity Original packet: Orig IP Hdr TCP Hdr Data Tunnel mode: Transport mode: New IP Hdr AH Header Orig IP Hdr TCP Hdr Data Orig IP Hdr AH Header TCP Hdr Data

IPSEC ESP ESP allows encryption Original packet: Tunnel mode: New IP Hdr Orig IP Hdr TCP Hdr Data ESP Hdr Orig ESP Trailer ESP Auth Transport Oi Orig IP Hdr ESP Hdr TCP Hdr Data ESP Trailer ESP Auth mode:

VPN and Firewall Idea of the Firewall The Firewall is the only connection to the Internet. All other computers (even the VPN-Gateway) are located behind the Firewall. Problem The firewall ist not able to analyze the data because they are encrypted.

VPN behind Firewall LAN (center) VPN-Gateway LAN (branch office) decrypted Data VPN Internet Firewall VPN Client

VPN and Firewall together LAN (center) Firewall and VPN-Gateway LAN (branch office) decrypted Data VPN Internet VPN Client

VPN in DMZ (between 2 FW) LAN (center) VPN-Gateway DMZ LAN (branch office) decrypted Data Internet VPN Internet inner Firewall outer Firewall VPN client

NAT Nat = Network Address Translation Allows through mapping the assignment of official IP- Addresses to private one. Therefore it is possible to gain access to the internet with private IP-Addresses. Sender-IP 192.168.0.10 New Sender-IP 134.91.90.70 Webbrowser New Target-IP 192.168.0.10 Target-IP 134.91.90.70 NAT Internet

IP IP (Internet Protocol) has 3 main tasks: 1. It carries the transport protocols TCP and UDP. 2. It builds IP-PackagesP out of the dt data which h have to be transmitted 3. It adds additional information, the IP-Header. Amongst others the header contains source and destination address.

TCP TCP (Transmission Control Protocol) confirms every received data package TCP repeats each data package until its receiving is confirmed TCP is reliable, that means the transmission is guaranteed 32 BIT

VPN practical training Firewall Firewall Internet VPN-Gateway VPN-Gateway private, local net =Tunnel private, local net

VPN Gateway Firewall private, local Net IP-Paket with target: 192.168.1.1 IP-Forwarding IP-Paket with Target: 134.91.90.70 Port 1723 or Gre-Protocol 47

VPN-Practical training 2 We have to consider Configuration of the firewall Configuration of DHCP Configuration of Routing Configuration of the VPN-Connection