Virtual Private Networks



Similar documents
Cisco Which VPN Solution is Right for You?

VPN. Date: 4/15/2004 By: Heena Patel

Technical papers Virtual private networks

How Virtual Private Networks Work

Secure Network Design: Designing a DMZ & VPN

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

Creating a VPN Using Windows 2003 Server and XP Professional

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services

Virtual Private Networks

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Firewalls and Virtual Private Networks

Security & Savings with Virtual Private Networks

Virtual Private Networks Solutions for Secure Remote Access. White Paper

Connecting Remote Users to Your Network with Windows Server 2003

Case Study for Layer 3 Authentication and Encryption

VPN SECURITY. February The Government of the Hong Kong Special Administrative Region

How Virtual Private Networks Work

Application Note: Onsight Device VPN Configuration V1.1

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Virtual Private Network and Remote Access Setup

Virtual Private Networks

CS 393/682 Network Security. Nasir Memon Polytechnic University Module 7 Virtual Private Networks

Cornerstones of Security

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

Site to Site Virtual Private Networks (VPNs):

Intranet Security Solution

A Web Broker Architecture for Remote Access A simple and cost-effective way to remotely maintain and service industrial machinery worldwide

SSL VPN vs. IPSec VPN

Introduction to Security and PIX Firewall

Chapter 5. Data Communication And Internet Technology

VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls

MCTS Guide to Microsoft Windows 7. Chapter 14 Remote Access

"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"

Network Access Security. Lesson 10

Using Application Layer Technology to Overcome the Impact of Satellite Circuit Latency on VPN Performance

Virtual Private Networks: IPSec vs. SSL

IP-VPN Architecture and Implementation O. Satty Joshua 13 December Abstract

AN OVERVIEW OF REMOTE ACCESS VPNS: ARCHITECTURE AND EFFICIENT INSTALLATION

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

What is a SSL VPN and How Does it Work?

1.264 Lecture 37. Telecom: Enterprise networks, VPN

Securing an IP SAN. Application Brief

VPN. VPN For BIPAC 741/743GE

Overview. Protocols. VPN and Firewalls

How To Understand And Understand The Security Of A Key Infrastructure

This chapter describes how to set up and manage VPN service in Mac OS X Server.

Chapter 10 Security Protocols of the Data Link Layer

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

IPsec VPN Security between Aruba Remote Access Points and Mobility Controllers

High Performance VPN Solutions Over Satellite Networks

Chapter 4 Virtual Private Networking

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Remote Access VPNs Performance Comparison between Windows Server 2003 and Fedora Core 6

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Module 10: Supporting Remote Users

Study on Remote Access for Library Based on SSL VPN

Implementing and Managing Security for Network Communications

VPN Technologies: Definitions and Requirements

L2F Case Study Overview

Firewalls, Tunnels, and Network Intrusion Detection

CCNA Security 1.1 Instructional Resource

Virtual Private Network and Remote Access

7.1. Remote Access Connection

IBM enetwork VPN Solutions

The BANDIT Products in Virtual Private Networks

Building Remote Access VPNs

The next generation of knowledge and expertise Wireless Security Basics

Wireless Encryption Protection

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

Security and the Mitel Networks Teleworker Solution (6010) Mitel Networks White Paper

Fundamentals of Network Security Graphic Symbols

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Understanding the Cisco VPN Client

Chapter 2 Virtual Private Networking Basics

ADSL or Asymmetric Digital Subscriber Line. Backbone. Bandwidth. Bit. Bits Per Second or bps

Enterprise Security Management CheckPoint SecuRemote VPN v4.0 for pcanywhere

Frame Relay vs. IP VPNs

Pre-lab and In-class Laboratory Exercise 10 (L10)

MANAGEMENT INFORMATION SYSTEMS 8/E

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Chapter 17 Determining Windows 2000 Network Security Strategies

TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents

VPN s and Mobile Apps for Security Camera Systems: EyeSpyF-Xpert

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Local-Area Network -LAN

Secure Use of the New NHS Network (N3): Good Practice Guidelines

Firewalls. Outlines: By: Arash Habibi Lashkari July Network Security 06

Chapter 8 Virtual Private Networking

A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform

Matrix Technical Support Mailer 167 NAVAN CNX200 PPTP VPN with Windows Client

Using a VPN with Niagara Systems. v0.3 6, July 2013

VoIP Security Threats and Vulnerabilities

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

Remote Access Security

Firewall Architecture

Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355

OvisLink 8000VPN VPN Guide WL/IP-8000VPN. Version 0.6

'Namgis Information Technology Policies

IBM enetwork Software White Paper enetwork VPNs--IBM s Virtual Private Network Solutions

Transcription:

Virtual Private Networks Rene Bahena Felipe Flores COEN 150 Project Report

Chapter 1: What is a VPN? VPN stands for Virtual Private Network and is a way of making a secure remote connection to a private network using the public Internet. For example, if I am in New York City and would like to access a confidential company database in San Francisco, I would need a secure connection between the company network and my computer. This secure connection could be established with a physical wire traversing the entire nation or with a dedicated leased line. Since this is virtually impossible or too expensive, a better way to establish the secure connection is needed. This is why VPN technology is used. VPN establishes a secure connection between the client and host by encapsulating data with encryption (Tunneling). Imagine that you live in a village in the Serengeti plains of Africa. There are hundreds of villages all around you, some close and others miles away. The normal way to travel is to walk from village to village. Traveling by foot is dangerous because you may encounter wild animals and hostile villages. Each village represents a private Local Area Network (LAN) and the Serengeti Plain is the Internet. Traveling by foot is like connecting to a server through the Internet. One has no control over the physical data connections and routers that make up the Internet, just like one has no control over the perils of traveling by foot between villages. This leaves users susceptible to security issues if users are trying to connect between two private networks using a public resource. Your village decides to build a fenced pathway to a nearby village so that there is an easier, more secure and direct way for people to travel This solution however, is very expensive and provides little flexibility or scalability. In addition, your village would like to connect to a second village that is much farther away but the costs are too high. This is very much like having a physical wire or a leased line. The fence (leased lines) are separate from the Plain (Internet), yet are able to connect the villages (LANs). Companies have invested in leased lines because of the need for reliable and secure connections between their remote offices and users. However, if the distance of the connection is too great, the costs are proportionally high, just like trying to build fenced pathways that span great distances. We could give each inhabitant of our village a small vehicle. The advantages of a vehicle include versatility, security, cost savings, and scalability (adding an additional vehicle is inexpensive and easy). These are the same advantages of a VPN. 2

1.1 VPN Advantages: Cost savings, scalability, global reach Because of the versatility of the technology, VPN can grow to accommodate more users and greater distances between offices much easier than a leased line because with leased lines, cost increases in proportion to the distance. VPN offers cost savings by eliminating the need for expensive long-distance leased lines on the server-side and eliminating longdistance telephone charges for remote access on the client-side. By utilizing a VPN, a company and its remote users only need internet access. Scalability is a major advantage that VPNs have over leased lines. As a company grows, more nodes must be added to the network and the number and complexity of dedicated lines needed for full connectivity increases illustrated in Figure 1. Figure 1: Complexity growing exponentially as more nodes are added to network 3

As Figure 2 depicts, the cost to a company for dedicated leased lines may be reasonable at first but can increase exponentially as the organization grows at a rate of: [(n(n+1))/2.] n. Combinatorial Explosion 50 45 40 Required Dedicated Leased Lines 35 30 25 20 15 10 5 0 1 2 3 4 5 6 7 8 9 10 Number of Offices Figure 2: As an organization grows and more offices must be added to the network, the number of leased lines required increases dramatically Mathematicians call this phenomenon a "combinatorial explosion" and in wide area networks (WAN) this explosion limits the flexibility for growth. VPNs that utilize the Internet avoid this problem by simply tapping into public networks. 1 While locations and distances between offices are significant limiting factors for leased lines, VPNs offer greater global reach, because Internet access is ubiquitous while dedicated leased lines are only available in certain locations. This global attribute of VPN technology facilitates companies to expand into global markets. 1 http://compnetworking.about.com/library/weekly/aa010701c.htm 4

1.2 VPN Disadvantages: Availability, public network security, undeveloped standards, legacy protocols There are four commonly raised concerns with VPN. 2 First, VPN relies on an internet connection that is susceptible to connection outages. This affects availability both at the client as well as the server end. Second, VPNs require an in-depth understanding of public network security issues. The security vulnerabilities on a public network are greater than those of a private network, as public networks are more exposed to attacks and hackers. Third, VPN technologies from different vendors may not work well together due to undeveloped standards. This means that the software running on the client must be compatible (from the same vendor) as the hardware or software running on the VPN server. Since there is no definitive industry standard for VPN, once choosing and investing in a particular manufacturer, one can become dependant on that particular manufacturer and must continue using their products to avoid compatibility issues. Starting over with a new product line with a new manufacturer would entail a penalty in costs. Lastly, VPNs need to accommodate legacy protocols other than IP. Many companies still use older proprietary protocols or alternate network protocols such as IPX, SPX, NetBIOS, AppleTalk, and NetBEUI. 2 http://compnetworking.about.com/library/weekly/aa010701c.htm 5

Chapter 2: Configurations and Categories 2.1 VPN Configurations: Remote Access and Site-to-Site VPN technology is awesome because it allows you to accommodate VPN to suit your company s needs instead of your company suiting the VPNs needs. VPNs can exist in two different configurations: Remote Access or Site-to-Site. Remote Access is when the VPN is established between an individual PC and a private LAN. This includes mobile employees and home offices. Remote access, depicted in Figure 3, to the company s private LAN is achieved with a desktop software client. In this configuration the tunnel (discussed in detail in chapter 3) is between a user s PC and the VPN router at the company s private LAN. Figure 3: A remote access VPN is a tunnel between a single user and a company private LAN. When VPN exists between a remote LAN and a private LAN it is in Site-to-Site configuration as depicted in Figure 4. In this configuration the tunnel is between two routers. Site-to-site configuration is further broken down into two different subconfigurations: Intranet and Extranet. 6

Intranet Site-to-Site is the most typical and occurs when a company has one or more remote locations that they wish to join through the VPN in a single private network as if it were one LAN. Extranet Site-to-Site is when a company has a close relationship with a partner such as a supplier, vendor, client, or other business and they want to share a subset of the private company LAN resources (an Extranet) with the partner over the extranet. The VPN would allow the partner to access the Extranet. 7

Figure 4: A Site-to-Site VPN is a tunnel joining two company private LANs. 8

2.2 VPN Categories: Hardware and Software There are two broad categories: hardware VPN systems and software VPN systems. Most hardware VPN systems like the one in Figure 5 are encrypting routers that are secure and easy to use. Since they provide the nearest thing to "plug and play" encryption equipment available, it is the popular choice. Since the encryption and decryption for tunneling is performed at the router and not at the server, CPU cycles are not wasted at the server nor wasted at the router in running the server operating system or applications. As a result, hardware VPN systems provide the highest network throughput of all VPN systems. However, they may not be as flexible as software based systems. Figure 5: EtherFast Cable/DSL VPN Router with 4-Port 10/100 Switch (www.linksys.com) Software VPNs offer flexibility that hardware VPNs cannot. They are ideal in situations where both endpoints of the VPN are not controlled by the same organization as is the case in extranets. Software VPNs offers the most flexibility in how network traffic is managed. Many software products allow traffic to be tunneled based on address or protocol, unlike hardware products, which generally tunnel all traffic they handle, regardless of protocol. In situations where users are connecting over dial-up links, software VPNs may be the best choice because dialup does not require high performance and data throughput. Software systems are generally harder to manage than encrypting routers. They require knowledge of the VPN host operating system, the VPN software itself, and the security mechanisms of the organization. 3 3 http://vpn.shmoo.com/vpn/faq.html#q4 9

Chapter 3: Security Nearly all VPNs share three fundamental security features: 1. Authentication 2. Encryption 3. Tunneling As we mentioned earlier, traveling from village to village in the Serengeti Plain could be dangerous without the protection of a vehicle. The internet is similar in that private data sent though the public networks without protection of tunneling could be stolen, intercepted, and corrupted. 3.1 Authentication Before establishing a secure channel for data transmission (encryption and tunneling), one must first authenticate both endpoints of the tunnel. This means proving the identity of both the client and the server. Imagine a scenario where a client begins to send private company data to a hacker that has taken the identity of the VPN server. Likewise, imagine the opposite scenario where the VPN server sends data to a hacker who has taken the identity of a VPN remote client. To ensure these breaches of security do not occur, a strong authentication method must be used. Applications that send unencrypted passwords over networks are extremely vulnerable to these types of security breaches. Packet sniffers used by security experts and hackers, are tools that "sniff" or reveal unencrypted passwords off of a network. Kerberos was created by MIT as a solution to these network security problems. The Kerberos protocol uses strong cryptography so that a client can prove its identity to a server (and vice versa) across an insecure network connection. 4 For more information about Kerberos authentication, visit: http://web.mit.edu/kerberos/www/. To ensure that a VPN is secure, limiting user access is only one piece of the puzzle; once the user is authenticated the data must also be protected. 4 http://web.mit.edu/kerberos/www/ 10

3.2 Encryption Without a mechanism to keep data private, information flowing through the public networks will be transmitted in clear text, which is highly vulnerable to hackers. All modern VPNs use encryption to scramble data into cipher-text before sending the packets of data through the Internet. When the data packets arrive at their destination, they are decrypted into readable text by the recipient. There are two basic types of cryptography: 1) symmetric and 2) asymmetric. Asymmetric cryptography is more complex than symmetric and utilizes mathematically related public and private key pairs. This method is often used for smaller, more sensitive packets of data such as during authentication. Symmetric cryptography has performance edge over asymmetric cryptography. Thus, it is commonly used in the tunneling process to exchange larger packets of data between two parties who have already authenticated each other using asymmetric cryptography. 5 VPN commonly uses asymmetric encryption to exchange keys and symmetric encryption to exchange data. Asymmetric systems are more secure, but symmetric systems have better performance. Both the client and server use asymmetric key exchange to generate a private key. Then they derive a symmetric public key from the private one to send the public key to each other. Each VPN endpoint now has its own private key as well as the other endpoint s public key. 6 An example of the cryptography used in VPN is the Triple Data Encryption Standard (3DES) which is an extension of the DES algorithm illustrated in Figure 6. 3DES encryption is defined as follows: Cipher Text = EK3(DK2(EK1(Plain Text))) Where EK1 denotes DES encryption operation using key K1, and DK1 denotes DES decryption operation using key K1. 3DES decryption is defined as: Plain Text = DK1(EK2(EK3(Cipher Text))) 5 http://findvpn.com/articles/encryption.php 6 Meredith, Gail, Cisco System User Magazine, Q2 2002, p.2 11

Figure 6: The Data Encryption Standard (DES) Algorithm 7 There are other encryption options available for VPN such as AES and RSA. The encryption used for authentication does not necessarily have to match the encryption used for tunneling. This allows VPN developers to make trade-offs between performance and strength of encryption to suite their security needs. 7 http://ratchkov.com/vpn/des/ 12

3.3 Tunneling VPN technology is based on the idea of tunneling. In brief, tunneling is the process of placing an entire packet within another packet and sending it over a network. Tunneling is comprised of three parts: 1. The Passenger 2. The Capsule 3. The Carrier The Passenger is the actual data being transmitted. The Capsule is the encrypting protocol being used such as PPTP, IPSec or L2TP. The Carrier is the transport protocol such as TCP/IP, NetBEUI, NetBIOS, or IPX over which the data is sent. Think of it like a letter. The letter is the data. The envelope is the capsule protecting the data and the postal service is the carrier. The focus of the paper is not the letter nor the carrier but the envelope, in other words, the tunnel. The Passenger, capsule and carrier are illustrated in Figure 7. VPN supports two types of tunneling: voluntary and compulsory tunneling. In voluntary tunneling, the VPN client manages connection setup. The client makes a connection to the VPN server over an Internet connection. Then, the VPN client application creates the tunnel to a VPN server over this connection. In voluntary tunneling there are no intermediaries between the two endpoints of the tunnel. In compulsory tunneling, the remote user s Internet Service Provider (ISP) manages VPN connection setup. When the client first makes a connection to the ISP, the ISP in turn immediately negotiates a VPN connection between that client and a VPN server. This creates an intermediary but from the VPN client s point of view, VPN connections are set up in just one step compared to the two-step procedure required for voluntary tunnels. Compulsory VPN tunneling authenticates clients and associates them with specific VPN servers using a Network Access Server (NAS). In return, service providers must take on the additional burden of installing and maintaining the NAS. 8 8 http://compnetworking.about.com/library/weekly/aa010701d.htm 13

3.3.1 Tunneling Protocols There are currently three major tunneling protocols for VPNs. They include the Point-to- Point Tunneling Protocol (PPTP), Internet Protocol Security (IPSec), and Layer 2 Tunneling Protocol (L2TP). 9 These three protocols are incompatible with each other. Point-to-Point Tunneling Protocol (PPTP) is based on the Point-to-Point-Protocol (PPP) which supports non-ip protocols such as NetBEUI, Appletalk, and IPX/SPX. PPTP exists at the Data Link layer of the OSI model as seen in Figure 7. PPTP supports 128-bit encryption and will use any authentication scheme supported by PPP. Internet Protocol Security (IPsec) is the second most popular VPN protocol. It supports stronger encryption than PPTP. IPsec exists at the Network Layer of the OSI model as seen in Figure 7. IPSec has two encryption modes: tunnel and transport. Tunnel encrypts the header and the payload of each packet while transport only encrypts the payload. IPSec can encrypt data between routers, between clients and routers, between routers and firewalls, and between clients and servers. Layer Two Tunneling Protocol (L2TP) is a protocol implemented primarily in Cisco products. Like PPTP, L2TP exists at the Data Link layer of the OSI model as seen in Figure 7. L2TP can be used as a tunneling protocol for site-to-site and remote access VPNs. L2TP can create a tunnel between routers, between a NAS and a router, and between a client and a router. 10 Figure 7: The Passenger, Capsule, and Carrier in the 7 Layer OSI model 9 http://www.internetweek.com/vpn/faq.htm 10 http://compnetworking.about.com/library/weekly/aa010701d.htm 14

Chapter 4: How does a VPN work? To make use of the VPN, the remote computer must have the VPN client software preinstalled. A connection to the internet must then be made through the local ISP. This connection may be made by any medium such as dialup, DSL, cable, T1 or wireless. Using this type of connection, a company no longer needs to lease its own lines for widearea communication. Instead, enterprises can securely use the public networks because the communication packets are encrypted before they are sent through the Internet "tunnel". 11 The VPN client software connects to the VPN server using a tunneling protocol such as PPTP. After the remote computer has been successfully authenticated by the VPN server, the server establishes a tunnel between the remote computer and the company private LAN. Data being exchanged through this tunnel in either direction will be encrypted at the sending end and decrypted at the receiving end. The remote computer will be assigned an IP address in the company s IP space and can now be trusted by computers on the company private LAN. Computers on the real company network can communicate with computers on the VPN via the VPN server which provides automatic IP address translation between the Internet service provider s IP address space and the company s private IP address space. 11 http://www.sciodata.com/vpn/vpnmonitoring.htm 15

Chapter 5: Conclusion We believe VPN is a powerful tool that increases company and individual productivity. It increases productivity because employees are no longer restricted to the company campus. This allows the company to expand its reach and project itself into global markets. However, Network Administrators should grant VPN access to users with a certain level of discretion. Companies should develop and enforce security policies that list requirements that must be met by employees to qualify for remote VPN access. As illustrated in the appendix tutorial Step by Step Tutorial: How to Setup a VPN, it is relatively easy to setup up a VPN server with simple programs that already come prepackaged with Microsoft Windows operating systems. For example, a workstation from within the company network can be setup to accept VPN connections and be connected to from the outside, creating a security hole if you have a disgruntled employee. Network Administrators should take security measures to ensure that these types of activities are blocked at the firewall. 16

Appendix: Step by Step Tutorial: How to Setup a VPN To configure a Windows XP VPN server: http://www.techrepublic.com/printerfriendly.jhtml?id=r00320020408shi01.htm&rcode= Or http://asia.cnet.com/itmanager/netadmin/printfriendly.htm?at=39050037-39006400t- 39000223c To configure a Windows XP VPN client: http://www.microsoft.com/windowsxp/pro/using/howto/gomobile/vpns.asp 17

Works Cited 1) Bradley Mitchell, Introduction to VPN, http://compnetworking.about.com/library/weekly/aa010701c.htm 2) Ibid 3) Tina Bird, VPN FAQ, http://vpn.shmoo.com/vpn/q4 4) MIT, Kerberos, http://web.mit.edu/kerberos/www/ 5) TheWhirs: findvpn, What is VPN encryption 6) Meredith, Gail, Cisco System User Magazine, Q2 2002, p.2 7) Radoslav Ratchkov, VPN, http://ratchkov.com/vpn/ 8) Ibid 9) InternetWeek, VPN FAQ, http://www.internetweek.com/vpn/faq.htm 10) Ibid 11) Sciodata Corportation, VPN Monitoring, http://www.sciodata.com/vpn/vpnmonitoring.htm 18