Reti Private Virtuali - VPN



Similar documents
Cisco Which VPN Solution is Right for You?

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Case Study for Layer 3 Authentication and Encryption

Introduction to Security and PIX Firewall

VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls

CCNA Security 1.1 Instructional Resource

Overview. Protocols. VPN and Firewalls

Virtual Private Networks

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

VPN. Date: 4/15/2004 By: Heena Patel

Firewalls and Virtual Private Networks

Virtual Private Networks

MPLS L2VPN (VLL) Technology White Paper

IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers

How Virtual Private Networks Work

Site to Site Virtual Private Networks (VPNs):

CS 4803 Computer and Network Security

1.1. Abstract VPN Overview

Chapter 5: Network Layer Security

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

BUY ONLINE AT:

VPN. VPN For BIPAC 741/743GE

Cisco Cisco 3845 X X X X X X X X X X X X X X X X X X

Cisco Dynamic Multipoint VPN: Simple and Secure Branch-to-Branch Communications

High Level Overview of IPSec and MPLS IPVPNs

What Is a Virtual Private Network?

Application Note: Onsight Device VPN Configuration V1.1

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

Building scalable IPSec infrastructure with MikroTik. IPSec, L2TP/IPSec, OSPF

Integrated Services Router with the "AIM-VPN/SSL" Module

Welcome to Today s Seminar!

IP Security. Ola Flygt Växjö University, Sweden

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Chapter 2 Virtual Private Networking Basics

Integrated Services Router with the "AIM-VPN/SSL" Module

AN OVERVIEW OF REMOTE ACCESS VPNS: ARCHITECTURE AND EFFICIENT INSTALLATION

WAN Data Link Protocols

SEC , Cisco Systems, Inc. All rights reserved.

Secure Network Design: Designing a DMZ & VPN

Lecture 17 - Network Security

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

VPN SECURITY. February The Government of the Hong Kong Special Administrative Region

1.264 Lecture 37. Telecom: Enterprise networks, VPN

Technical papers Virtual private networks

RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. Kapil.Kumar@relianceinfo.com

CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs

Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355

November Defining the Value of MPLS VPNs

Cisco Integrated Services Routers Performance Overview

Part The VPN Overview

Introduction to MPLS-based VPNs

Chapter 4 Virtual Private Networking

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Advanced IPSec with GET VPN. Nadhem J. AlFardan Consulting System Engineer Cisco Systems

Today s Topics SSL/TLS. Certification Authorities VPN. Server Certificates Client Certificates. Trust Registration Authorities

Configuring a Site-to-Site VPN Tunnel Between Cisco RV320 Gigabit Dual WAN VPN Router and Cisco (1900/2900/3900) Series Integrated Services Router

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Building VPNs. Nam-Kee Tan. With IPSec and MPLS. McGraw-Hill CCIE #4307 S&

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Multi Protocol Label Switching (MPLS) is a core networking technology that

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

Virtual Privacy vs. Real Security

Cisco Group Encrypted Transport VPN: Tunnel-less VPN Delivering Encryption and Authentication for the WAN

Introduction of Quidway SecPath 1000 Security Gateway

Cisco Networks (ONT) 2006 Cisco Systems, Inc. All rights reserved.

ICTTEN6172A Design and configure an IP- MPLS network with virtual private network tunnelling

Agilent Technologies RouterTester Whitepaper

Virtual Private Network and Remote Access Setup

A Review Paper on MPLS VPN Architecture

Intranet Security Solution

Chapter 2 - The TCP/IP and OSI Networking Models

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

MPLS Concepts. Overview. Objectives

Internetwork Security

MPLS VPN Services. PW, VPLS and BGP MPLS/IP VPNs

Virtual Private Networks Solutions for Secure Remote Access. White Paper

CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec

VPN Solutions. Lesson 10. etoken Certification Course. April 2004

IP Tunneling and VPNs

Understanding the Cisco VPN Client

VPN Modules for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

Virtual Private Networks

The BANDIT Products in Virtual Private Networks

Exam : Implementing Cisco Service Provider Next-Generation Egde Network Services. Title :

Introducing Basic MPLS Concepts

WAN Traffic Management with PowerLink Pro100

Investigation of different VPN Solutions And Comparison of MPLS, IPSec and SSL based VPN Solutions (Study Thesis)

Network Security. Lecture 3

Introducción n a MPLS y MPLS VPN MPLS VPN

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

How To Understand And Understand The Security Of A Key Infrastructure

Chapter 32 Internet Security

Chapter 10. Network Security

MPLS-based Virtual Private Network (MPLS VPN) The VPN usually belongs to one company and has several sites interconnected across the common service

VIRTUAL PRIVATE NETWORKS: SECURE REMOTE ACCESS OVER THE INTERNET

IBM enetwork VPN Solutions

Sprint Global MPLS VPN IP Whitepaper

Frame Relay vs. IP VPNs

Transcription:

1

Reti Private Virtuali - VPN Marco Misitano, CISSP Enterprise Conulting, Security misi@cisco.com Ordine degli Ingegneri della Provincia di Milano 2

Agenda Technology introduction Remote Access VPN Site to Site VPN Recap 3

What is a VPN? Connectivity deployed on a Shared Infrastructure with the same policies and performance as a private network Central /HQ Virtual Private Network Regional Sites Branches SoHo Telecommuters Mobile Users Partners Address space separation Traffic separation Routing separation Customers 4

VPN Services and Technologies Service Architecture Technologies Access VPN Client Initiated NAS Initiated CPE and Network based IPsec, L2TP, PPTP Dial, ISDN, DSL, Cable, Wireless site to site Intranet VPN Extranet VPN IP Tunnel Virtual Circuit MPLS IP Tunnel Virtual Circuit MPLS CPE and Network based IPsec, GRE FR, ATM IP or IP + ATM CPE and Network based IPsec, GRE FR, ATM IP or IP + ATM 5

What is a Secure VPN? Address space separation Traffic separation Routing separation Authentication Confidentiality Data integrity VPN Secure VPN 6

Types of VPNs Site-to to-site Between two network entities e.g. routers Trusted networks behind each entity Should provide performance, resilience and QoS Remote access Between a host and a router Central control of remote users Scalable deployment No trusted networks at remote location 7

Remote Access VPN 8

Remote Access VPNs Access: PSTN ISDN LAC Mobile Users, Telecommuters, and Small Remote Offices LAC POP POP SP or Company s IP Network Corporate Intranet LNS Security Server Remote Access VPN can be: Client-initiated NAS-initiated 9

L2TP over UDP/IP Technology Primer Initiated by Client software (CPE) or Service Provider s L2TP Access Concentrator (LAC) Original IP Layer L2TP protocol (RFC 2661) L2TP tunnel Tunnel is Terminated by customer s Gateway: L2TP Network Server (LNS) Original IP Layer PPP IP HDR Data IP HDR UDP L2TP HDR PPP IP HDR Data IP HDR Data Authorization/Addressing controlled by the Corporation or Service Provider Accounting can be performed by Service Provider/Corporation L2TP tunnel allows session multiplexing Tunnel authentication 10

L2TP Remote Access VPN Client-Initiated/NAS Initiated Advantages L2TP is open standard (multivendor support) Provisioning of VPN services without SP infrastructure changes (transparent to SP network) Ubiquitous client software (PPTP now, L2TP with MS Win2K) Very flexible, can span over multiple SP networks Supports tunneling of any protocol encapsulated by PPP Support for private addressing Limitations Moderately Scalable -No tunnel sharing so each concurrent user terminates a separate tunnel on gateway Client software MAY need to be installed on user PC Client Software will need to be supported (support desk costs) No embedded security - No Integrity - No Confidentiality IPsec can be used to protect L2TP 11

Remote Access VPN: when to use? Need is remote access via PSTN/ISDN for: teleworkers, telecommuters, extranet users Scalable and manageable solution (PC client to maintain, Win2K, XP have L2TP per default) Standard-based interoperability Support of private addressing RFC1918 Worldwide deployed solution 12

Site to Site, PVC Based VPN 13

Frame Relay/ATM Terminology PVC: Permanent Virtual Circuit, a virtual circuit that is permanently available. ATM: Asynchronous Transfer Mode, a network technology based on transferring data in cells or packets of a fixed size. Frame Relay (FR): A packet-switching protocol for connecting devices on a Wide Area Network (WAN). LL: Leased Line, a permanent telephone connection between two points set up by a telecommunications common carrier. Source: www.webopedia.com 14

Site to Site VPN PVC Based Telecommuter Small or Home Office ISD N DSL Cable Access Provider POP PSTN PVC1 Extranet PVC4 Branch Remote Site: VPN-Optimized Routers and Cisco Secure PIX Firewall Leased Line Branch Office 1 PVC3 PVC2 Public FR/ATM Network PVC5 Branch Office 2 Headquarters Office Enterprise Central Site: VPN-Optimized Routers or Cisco Secure PIX Firewall 15

Site to Site VPN PVC based Advantages Quickly and quite inexpensively provision of VPN services from existing ATM/FR infrastructure PVCs provide logical separation of VPN traffic and moderate to good level of security Quick access to layer 2 QoS and SLA enforcement with established technologies such as: FR CIR, ATM SCR / MCR / PCR, etc. Limitations Full point-to-point mesh required leads to N-squared scalability issues Provisioning, maintenance and changes become time consuming for large VPNs PVC doesn t offer security (integrity, authentication, confidentiality) IP level QoS only available if CPE device can perform layer 4 routing and IP traffic shaping before VC Adding new sites imply complex VPN reconfiguration Dual Homing (redundancy) means duplicate number of connections 16

PVC based VPN: when to use? Need is to build a robust, partially meshed Intranet backbone Support hub-and-spoke hierarchical topology Support of private addressing RFC1918 Standard based solution Native Layer 2 Quality of Service 17

Site to Site, Tunnel Based VPN 18

Dedicated VPNs: IP Tunnels Remote Access Users with IPsec PC Client Router with Firewall Cisco CPE Router with Cisco IOS Public IP Network Cisco CPE Router with Cisco IOS IP Tunnels Most Used IP Tunneling Protocols are: GRE IPsec 19

Site to Site, GRE Based VPN 20

Site to Site VPN GRE based Advantages Relatively high performance tunneling All IP QoS available Quick deployment (available on all Cisco routers and Layer 3 switches) Supports private addressing and traffic segregation Supports tunneling of non-ip unicast traffic Supports IP Multicast Supports Intra-VPN routing Limitations Overlay point-to-point mesh required leads to N-squared scalability issues Minimal security - No Integrity - No Authentication - No Confidentiality QoS only possible with single, private SP networks (not over Internet) Adding new sites imply VPN complex reconfiguration Dual Homing (redundancy) means duplicate number of tunnels 21

GRE VPN: when to use? Need to build an overlaid, partially meshed connectivity between few sites Support hub-and-spoke nonhierarchical topology Support of private addressing RFC1918 Standard RFC-based solution Quality of Service (ToS based) 22

Site to Site, IPsec Based VPN 23

What Is IPSec? 7: Application 6: Presentation 5: Session 4: Transport TCP/UDP 3: Network IP 2: Data Link 1: Physical IPSec Standard for implementing Authentication, Confidentiality and Integrity on IP Networks Application Independent (Web, Mail, Voice.) Transport Independent (Leased Lines, FR, ISDN, ) Two major components IP Security (IPSec) Packet format to transport encrypted data Internet Key Exchange (IKE) Authentication and policy negotiation between devices 24

Authentication Router A Internet IPSec Tunnel Router B How does Router A know he is talking to Router B? 25

Confidentiality Internet IPSec Tunnel Sniffer Traffic across an insecure network should be encrypted for confidentiality 26

Encryption Alternatives Application Layers (5-7) Application-Layer Encryption (e.g. PGP) Transport/ Network Layers (3-4) Network-Layer Encryption (IPSec) Link/Physical Layers (1-2) Link-Layer Encryption Link-Layer Encryption 27

Data Integrity Data received = data sent Mathematical algorithms + digital signatures (MD5, SHA-1) 28

Agenda IPSec technologies Encapsulation types IKE Encryption Key management Digital certificates 29

IPSec Authentication Header (AH) RFC 2402 (Nov 98) Additional header inside the IP datagram Includes anti-replay - Detects and rejects repeated packets MD5 or SHA-1 can be used HMAC strengthens the algorithm 30

IPSec AH Original IP datagram IP header other headers and payloads secret key Digital signature (MD5 or SHA-1) IP header Auth. header other headers and payloads Authenticated IP datagram 31

IPSec Encapsulating Security Payload (ESP) RFC 2406 (Nov 98) Confidentiality of Whole IP datagram (tunnel mode) IP payload only (transport mode) DES (RFC 2405) 3DES (RFC 2451) encryption algorithms can be used Version 3 IETF draft adds AES (FIPS 197) New standard More computationally efficient Longer keys = more secure 32

IPSec ESP Transport Used end to end, between hosts Protects the IP payload only ESP Transport tunnel Sniffers are defeated 33

IPSec ESP Transport Original IP datagram IP header other headers and payloads secret key Encryption algorithm IP header ESP header other headers and payloads ESP trailer IP datagram with transport ESP 34

IPSec ESP Tunnel Usually between firewalls/routers for VPNs ESP Tunnel tunnel Sniffing possible Sniffing possible Sniffers are defeated 35

IPSec ESP Tunnel.or between client and firewall/vpn concentrator for remote access ESP Tunnel tunnel Sniffing possible Sniffers are defeated 36

IPSec ESP Tunnel Original IP datagram IP header other headers and payloads New IP header built by tunnel end new IP header secret key Encryption algorithm new IP header ESP header IP header other headers and payloads ESP trailer IP datagram with tunnel ESP 37

Agenda IPSec technologies Encapsulation types IKE Encryption Key management Digital certificates 38

Security Associations Router IKE SA IPSec SAs Policy agreement between two entities, including: Encryption algorithm (DES or 3DES) Hash (MD-5 5 or SHA) Authentication (RSA signature, RSA nonce or pre-shared keys D-H H Group Key lifetime Types of security associations Bidirectional for management (IKE SA) Unidirectional for data (IPSec SA) 39

IPSec needs IKE Internet Key Exchange (IKE) RFC 2409 Negotiates the IPSec SA policy Eliminates need for manual config of parameters Permits certificate authority support IKE Transform, Key material IKE protocol IPsec protocols ESP, AH IKE Transform, Key material 40

Agenda IPSec technologies Encapsulation types IKE Encryption Key management Digital certificates 41

Encryption Symmetric Cryptography Uses a shared secret key to encrypt and decrypt transmitted data Data flow is bidirectional Provides data confidentiality only Does not provide data integrity or non-repudiation Asymmetric Cryptography Also known as Public Key Cryptography Utilizes two keys: private and public keys Two keys are mathematically related but different values Computationally intensive Provides data confidentiality Can provide for data integrity as well as non-repudiation 42

Agenda Definition of IPSec VPNs IPSec technologies Encapsulation types IKE Encryption Key management Digital certificates IPSec VPN Implementation Product Positioning 43

IKE needs public key authentication Alice s public key Bob s public key IKE (to authenticate Bob s IKE) IKE protocol (to authenticate Alice s IKE) IKE Transform, Key material IPsec protocols ESP, AH Transform, Key material Alice Bob 44

Manual Public Key Exchange cont d Limited scalability: n peers => n*(n-1) manual key exchange/authentication configs key exchanges + authentication 45

Automated Public Key Exchange cont d Scalable: n peers => n authentication and n certificates Certification Authority authentications automatic certificate exchanges 46

Agenda IPSec technologies Encapsulation types IKE Encryption Key management Digital certificates 47

Digital Certificates Can prove that: The sender is really who they claim to be Certificates provide scalable authentication Non Repudiation Prevents a party involved in a communication from later denying having participated Proof of identity of sender Message 0000123 SHA, DH, 3837829 1/1/93 to 12/31/98 Alice Smith, Acme Corp DH, 3813710 Acme Corporation, Security Dept. SHA, DH, 2393702347 48

How peers work with CA? CA s own certificate signed by CA SCEP 2. Peer fetches CA s certificate 3. Peer transmits its public key 5. Peer fetches its certificate 4. Peer s certificate signed by CA Strong or human authentication needed for steps 1. and 2. 1. Peer generates public/private key pair 49

Site to Site VPN IPsec based Advantages Open standard (multi-vendor support) Security (Authentication, Integrity, confidentiality, Authorization) Supports large variety of Authentication and Encryption standards Quick deployment (no infrastructure changes required) Hardware based encryption /decryption available to help address performance and scalability issues Some (layer 2 and 3) QoS Limitations The overlay point-to-point mesh required leads to N-squared scalability issues Performance and scalability are hindered by computationally intensive encryption / decryption Can become costly to implement (Certificate Authorities and Key Management services, hardware upgrades for encryption acceleration, software upgrades, etc.) Export restrictions on encryption technology Only supports tunneling of IP packets Adding new sites imply VPN complex reconfiguration No support of intra-vpn routing No support of IP Multicast 50

IPsec VPN: when to use? Need to build a secure, partially meshed Intranet/Extranet. Allow secure access for mobile users Support hub-and-spoke non-hierarchical topology Support of private addressing RFC1918 Standard RFC-based solution Use of Certificates 51

Site to Site, MPLS Based VPN 52

Multiprotocol Label Switching (MPLS) MPLS characteristics: Packet classification only where the packet enters the network Packet classification is encoded as a label Packets are forwarded in the core, without having to re-classify them - No further packet analysis Label swapping - packets are switched, not routed 53

Overlay VPNs vs. MPLS VPNs VPN Topology VPN B VPN A VPN C VPN B VPN A VPN B VPN A VPN C VPN B VPN A VPN C VPN C VPN C VPN C VPN A VPN B VPN C VPN B VPN A Connection-Oriented VPN A VPN B VPN C VPN B VPN A Connectionless VPN Aware Network : VPNs are built-in in rather than overlaid 54

Site to Site VPN MPLS Advantages Open standard Flexible architectures extend IP services over multiple technologies (e.g. IP + ATM) Centralized provisioning and management Cisco IOS combines all VPN-enabling technologies (MPLS, BGP, QoS features, etc.) Compatible with other VPN technologies (IPsec, PPP tunneling, etc.) Enables non-vpn related features: - Traffic engineering (RRR) - Faster packet switching through network (label switching > packet routing) - Making ATM network IP-aware Transparent to Intra-VPN Routing Easiness in adding move sites No need of complex CPE configuration Limitations Likely requires software and protocol upgrades of SP s IP network - Multiprotocol extension for BGPv4, - Provisioning PE functionality on Edge LSRs, IP / MPLS / ATM QoS/CoS mapping, - Usage Monitoring - SLA enforcement - Billing setup, etc. Security -No Integrity -No confidentiality - Single SP (not over Internet), no IPMc 55

MPLS VPN: when to use? MPLS-VPN enabled Public IP Network (SP) Need to build a full-meshed Intranet/Extranet. Support of private addressing RFC1918 Standard based solution Ease of VPN re-configuration/provisioning Provides scalable, robust QoS mechanism Traffic engineering capabilities 56

Recap 57

Recap: Ways to Build IP VPNs IP based infrastructure with tunnelling Frame relay with virtual circuits Connection based IP/IPsec/L2TP Tunnel Private Virtual Circuit Multi Protocol Label Switching Forwards packets based on Labels Connectionless Data Data Data Data 58

Recap: VPN Services L2TP GRE IPsec MPLS Authentication X X Integrity Confidentiality X X RFC 1918 X X X X Intra-VPN rout. X X* X QoS X X X X Non IP Protocols X X Scalability X X Application RA, Extranet Intranet RA, S2S Intranet 59

60