How To Create A Virtual Network With A Router And Network Operating System (Ip) For A Network (Ipv) (Ip V2) (Netv) And A Virtualization) (Network) (Wired) (Virtual) (Wire)



Similar documents
The OpenEapSmartcard platform. Pr Pascal Urien ENST Paris

Cisco Which VPN Solution is Right for You?

A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2

Security+ Guide to Network Security Fundamentals, Third Edition Chapter 8 Authentication

Cisco Secure ACS. By Igor Koudashev, Systems Engineer, Cisco Systems Australia 2006 Cisco Systems, Inc. All rights reserved.

Extensible Authentication Protocol (EAP) Security Issues

Chapter 10 Security Protocols of the Data Link Layer

ipad in Business Security

Network Access Control and Cloud Security

Deploying iphone and ipad Security Overview

UNIVERZITA KOMENSKÉHO V BRATISLAVE FAKULTA MATEMATIKY, FYZIKY A INFORMATIKY PRÍPRAVA ŠTÚDIA MATEMATIKY A INFORMATIKY NA FMFI UK V ANGLICKOM JAZYKU

Authentication and Security in IP based Multi Hop Networks

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

iphone in Business Security Overview

Application Note: Onsight Device VPN Configuration V1.1

Cisco Wireless Security Gateway R2

Network Access Control and Cloud Security

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May New Features and Enhancements. Tip of the Day

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues

Network Authentication X Secure the Edge of the Network - Technical White Paper

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services

Deploying iphone and ipad Virtual Private Networks

Authentication, Authorization and Accounting (AAA) Protocols

This chapter describes how to set up and manage VPN service in Mac OS X Server.

Cisco Secure Access Control Server 4.2 for Windows

Computer Networks. Secure Systems

The next generation of knowledge and expertise Wireless Security Basics

VPN SECURITY. February The Government of the Hong Kong Special Administrative Region

FMC (Fixed Mobile Convergence)

Network Access Security. Lesson 10

Global Identity Management of Virtual Machines Based on Remote Secure Elements

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

Creating a VPN Using Windows 2003 Server and XP Professional

Intranet Security Solution

Defender EAP Agent Installation and Configuration Guide

RAD-Series RADIUS Server Version 7.3

802.1x in the Enterprise Network

Certficate Extensions and Attributes Supporting Authentication in PPP and Wireless LAN. Daniel Schwarz

VPN. Date: 4/15/2004 By: Heena Patel

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

GPRS and 3G Services: Connectivity Options

HughesNet Broadband VPN End-to-End Security Using the Cisco 87x

Cisco Virtual Office Express

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

How To Understand And Understand The Security Of A Key Infrastructure

Junos Pulse Supported Platforms Guide

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

7.1. Remote Access Connection

Release Notes. NCP Secure Client Juniper Edition. 1. New Features and Enhancements. 2. Problems Resolved

Domain 6.0: Network Security

Particularities of security design for wireless networks in small and medium business (SMB)

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009

CTS2134 Introduction to Networking. Module Network Security

RadSec RADIUS improved. Stig Venaas

Junos Pulse Supported Platforms

How To Test An Eap Test On A Network With A Testnet (Networking) On A Pc Or Mac Or Ipnet (For A Network) On An Ipnet Or Ipro (For An Ipro) On Pc Or Ipo

Using IKEv2 on Juniper Networks Junos Pulse Secure Access Appliance

WiFi Security: Deploying WPA/WPA2/802.1X and EAP in the Enterprise

WIRELESS NETWORK SECURITY

Network Security 1 Module 4 Trust and Identity Technology

freeradius A High Performance, Open Source, Pluggable, Scalable (but somewhat complex) RADIUS Server Aurélien Geron, Wifirst, January 7th 2011

MOC 6435A Designing a Windows Server 2008 Network Infrastructure

Cisco IOS Firewall. Scenarios

EAP-SIM Authentication using Interlink Networks RAD-Series RADIUS Server

Configuring Security Solutions

Cisco RV 120W Wireless-N VPN Firewall

Developing Network Security Strategies

Co-existence of Wireless LAN and Cellular Henry Haverinen Senior Specialist Nokia Enterprise Solutions

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

Application Note Secure Enterprise Guest Access August 2004

How Virtual Private Networks Work

MCTS Guide to Microsoft Windows 7. Chapter 14 Remote Access

This course has been retired. View the schedule of current <a href=

Authentication. Authentication in FortiOS. Single Sign-On (SSO)

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform

EAP Authentication Protocols for WLANs

Issue 1 EN. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

Network Security. Chapter 10 Security Protocols of the Data Link Layer

Juniper / Cisco Interoperability Tests. August 2014

Link Layer and Network Layer Security for Wireless Networks

Joe Davies Principal Writer Windows Server Documentation

Lecture 3. WPA and i

User Authentication in the Enterprise Network

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

Cisco CCNP Optimizing Converged Cisco Networks (ONT)

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. Kapil.Kumar@relianceinfo.com

The following chart provides the breakdown of exam as to the weight of each section of the exam.

ClickShare Network Integration

IBM enetwork VPN Solutions

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Transcription:

Post-IP technologies virtualization and security Guy Pujolle 1

Virtualization for a post-ip network 2

Geni Intel would like to propose a generic router Intel proposes to have a generic hardware with virtual network operating system A router can support simultaneously CISCO IOS and dj Juniper Junos and dal Alcatel los and dn Nortel los OS, etc. Cisco reaction was to virtualize the different releases of IOS. 3

Virtual router Network A Network D Network B Network C 4

Virtualization of the Control Plane Control algorithms NOS NOS NOS NOS NOS Control Control Control Control Control 1 2 3 4 5 Hypervisor 5

Why virtualization? A better use of the resources Sharing of the resources for the routing schemes Security of the machines against attacks Isolation of the traffic in the virtual machines Management and control Need an hypervisor How to move et the virtual entities ttes(oute,etc) (router, etc.) 6

Virtualization of the Management Plane NM NM NM NM NM System System System System System 1 2 3 4 5 Hypervisor 7

Protocol virtualization A B C D = E A = IP stack is mandatory in the core network within the virtual protocol 8

Virtualization of the Data Plane 9

Virtualization of the Data Plane 10

Virtualization of the protocols A D E A B C D E A B D E A A E A B C D E A C D E 11

Post-IP security through a strong authentication and closed traceability

Why two-factor authentication is needed Password issues Attackers can sniff out what's typed on keyboards, simply by recording keystroke sounds Recommendation to enhance security with two-factor authentication that combines passwords with one-time- password tokens or smartcards,, or with biometric recognition, like fingerprint readers A well known two-factor authentication device is the RSA SecurID token This token works with a proprietary authentication infrastructure called ACE.

Two-factor authentication Our proposal Tokens are based on the Java Card technology They execute Java applications supported by the open code project OpenEapSmartcard. The authentication platform is fully based on IETF standards (mainly the Extensible Authentication Protocol,, EAP), no proprietary features Our authentication scenario deals with the classical SSL/TLS protocol (more precisely EAP TLS), which is widely deployed through the WEB, and which relies on Public Key Infrastructure (PKI)

What is EAP? EAP is an IETF standard d The Extensible Authentication Protocol (EAP) was introduced in 1999, in order to define a flexible authentication framework. EAP,, RFC 3748, "Extensible Authentication Protocol, (EAP)" EAP TLS,, RFC 2716, "PPP EAP TLS Authentication Protocol EAP SIM,, RFC 4186, " Extensible Authentication Protocol Methodfor Global Systemfor Mobile Communications (GSM) Subscriber Identity Modules (EAP SIM) EAP AKA,, RFC 4187, " Extensible Authentication Protocol Method for 3 rd Generation Authentication and Key Agreement (EAP AKA) AKA)

What is EAP? 1 Request 2 Response 3 Success 4 Failure 1 Identity 2 Notification 3 NAK 4 MD5 challenge 13 EAP-TLS 18 EAP-SIM Packet Identifier Packet Length 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Code Identifier Length +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ Type Type-Data... +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- EAP Message Format.

What is EAP? An Esperanto for Access Control in IP infrastructures. Wireless LAN Wi Fi, IEEE 802.1x WiMAX mobile, IEEE802 802.16e, PKM EAP Wired LANs ETHERNET, IEEE 802.3 PPP, RFC 1661, The Point to Point Protocol (PPP) VPN (Virtual Private Network) technologies PPTP, RFC 2637, " Point to Point Tunnelling Protocol " L2TP, RFC 2661, " Layer Two Tunnelling Protocol " IKEv2, RFC 4306, "Internet Key Exchange Protocol Authentication Server RADIUS, RFC 3559, RADIUS (Remote Authentication Dial In User Service) Support For Extensible Authentication Protocol (EAP) DIAMETER, RFC 4072, "Diameter Extensible Authentication Protocol Application Voice Over IP UMA, Unlicensed Mobile Access, http://www.umatechnology.org org

What is EAP? EAP components According to RFC 3748, EAP implementations conceptually consist of the four following components: 1 The lower layer is responsible for transmitting and receiving EAP frames between the peer and authenticator. 2 The EAP layer receives and transmits EAP packets via the lower layer, implements duplicate detection and retransmission, and delivers and receives EAP messages to and from EAP methods. 3 EAP peer and authenticator layers. Based on the Code field, the EAP layer de multiplexes incoming EAP packets to the EAP peer and authenticator layers. 4 EAP methods implement the authentication algorithms, and receive and transmit EAP messages. EAP methods can be implemented in Java Card systems.

Ordinateurcentral What is EAP? EAP Java Card gy Full Software 4 EAP method EAP method EAP method EAP method Technology 3 EAP-Peer Peer Layer EAP-Auth. Auth. Layer Implementations 2 1 EAP-Layer Lower-Layer EAP-Layer RADIUS Server Peer Authentication Server Partial Software Implementations + EAP JavaCard Technology Peer EAP JavaCard Client EAP-Peer Peer Layer EAP-Layer Lower-Layer 4 EAP Methods 3 2 1 Wi-Fi Network EAP JavaCard Server EAP-Auth. Auth Layer EAP-Layer Java Card Enabled RADIUS Server Authentication Server Mainframe

The open platform, Why open Java Card technology code? Internet and WEB technologies are based on open code. No proprietary features. Good security principle that enables code reviewing. Fair choice among multiple Java Card systems

OpenEapSmartcard. Architecture t Overview

Authentication platform Overview

The platform

Summary We have presented two-factor authentication tokens, based on the Java Card technology We have introduced the open code project OpenEapSmartcard,, which is used by these token We have built an authentication architecture fully based on IETF standards. We have shown a real Wi-Fi platform that deals with these technologies.