Virtual Private Networks



Similar documents
Virtual Private Networks

Network Security. Raj Jain. The Ohio State University. Columbus, OH Raj Jain 31-1

Chapter 31 Network Security

Cisco Which VPN Solution is Right for You?

IBM enetwork VPN Solutions

VPN. Date: 4/15/2004 By: Heena Patel

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

How Virtual Private Networks Work

VPN SECURITY. February The Government of the Hong Kong Special Administrative Region

Firewalls and Virtual Private Networks

Security in Computer Networks

Creating a VPN Using Windows 2003 Server and XP Professional

Virtual Private Networks Solutions for Secure Remote Access. White Paper

This chapter describes how to set up and manage VPN service in Mac OS X Server.

Intranet Security Solution

CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs

Virtual Private Networks

Secure Network Design: Designing a DMZ & VPN

Case Study for Layer 3 Authentication and Encryption

Internet Protocol: IP packet headers. vendredi 18 octobre 13

How Virtual Private Networks Work

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

Network Access Security. Lesson 10

VIRTUAL PRIVATE NETWORKS: SECURE REMOTE ACCESS OVER THE INTERNET

Chapter 4: Security of the architecture, and lower layer security (network security) 1

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Remote Access VPNs Performance Comparison between Windows Server 2003 and Fedora Core 6

Gigabit SSL VPN Security Router

Network Address Translation (NAT) Virtual Private Networks (VPN)

MOC 6435A Designing a Windows Server 2008 Network Infrastructure

Overview. Protocols. VPN and Firewalls

Post-Class Quiz: Telecommunication & Network Security Domain

GPRS / 3G Services: VPN solutions supported

Remote Connectivity for mysap.com Solutions over the Internet Technical Specification

Cisco Cisco 3845 X X X X X X X X X X X X X X X X X X

Lecture Objectives. Lecture 6 Mobile Networks: Nomadic Services, DHCP, NAT, and VPNs. Agenda. Nomadic Services. Agenda. Nomadic Services Functions

How To Protect Your Network From Attack

Application Note: Onsight Device VPN Configuration V1.1

CS 393/682 Network Security. Nasir Memon Polytechnic University Module 7 Virtual Private Networks

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Today s Topics SSL/TLS. Certification Authorities VPN. Server Certificates Client Certificates. Trust Registration Authorities

TABLE OF CONTENTS NETWORK SECURITY 2...1

Chapter 12 Supporting Network Address Translation (NAT)

21.4 Network Address Translation (NAT) NAT concept

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services

Integrated Services Router with the "AIM-VPN/SSL" Module

Connecting Remote Users to Your Network with Windows Server 2003

Cornerstones of Security

VPN Modules for Cisco 1841 and Cisco 2800 and 3800 Series Integrated Services Routers

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Integrated Services Router with the "AIM-VPN/SSL" Module

VPN VPN requirements Encryption VPN-Types Protocols VPN and Firewalls

IP-VPN Architecture and Implementation O. Satty Joshua 13 December Abstract

Network Security [2] Plain text Encryption algorithm Public and private key pair Cipher text Decryption algorithm. See next slide

A Performance Analysis of Gateway-to-Gateway VPN on the Linux Platform

Building scalable IPSec infrastructure with MikroTik. IPSec, L2TP/IPSec, OSPF

z/os Firewall Technology Overview

Virtual Private Networks: IPSec vs. SSL

AN OVERVIEW OF REMOTE ACCESS VPNS: ARCHITECTURE AND EFFICIENT INSTALLATION

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

INTERNET SECURITY: FIREWALLS AND BEYOND. Mehernosh H. Amroli

Network Security. Lecture 3

(d-5273) CCIE Security v3.0 Written Exam Topics

Virtual Private Network and Remote Access Setup

Technical papers Virtual private networks

Lecture 17 - Network Security

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Secured Voice over VPN Tunnel and QoS. Feature Paper

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

DirectAccess in Windows 7 and Windows Server 2008 R2. Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

IPSec vs. SSL: Why Choose?

BUY ONLINE AT:

Network Security Topologies. Chapter 11

SSVVP SIP School VVoIP Professional Certification

Galileo International. Firewall & Proxy Specifications

Proxy Server, Network Address Translator, Firewall. Proxy Server

SSL VPN. Virtual Private Networks based on Secure Socket Layer. Mario Baldi. Politecnico di Torino. Dipartimento di Automatica e Informatica

Understanding Windows Server 2003 Networking p. 1 The OSI Model p. 2 Protocol Stacks p. 4 Communication between Stacks p. 13 Microsoft's Network

Part III-b. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai Siemens AG 2001, ICN M NT

High Performance VPN Solutions Over Satellite Networks

Protocol Security Where?

CCNA Security 1.1 Instructional Resource

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

NETWORK SECURITY (W/LAB) Course Syllabus

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Компјутерски Мрежи NAT & ICMP

LECTURE 4 NETWORK INFRASTRUCTURE

Cisco Networks (ONT) 2006 Cisco Systems, Inc. All rights reserved.

Transcription:

Virtual Private Networks The Ohio State University Columbus, OH 43210 Jain@cse.ohio-State.Edu http://www.cse.ohio-state.edu/~jain/ 1

Overview Types of VPNs When and why VPN? VPN Design Issues Security Issues VPN Examples: PPTP, L2TP, IPSec 2

What is a VPN? Private Network: Uses leased lines Virtual Private Network: Uses public Internet Internet Service Provider 3

Types of VPNs WAN VPN: Branch offices Access VPN: Roaming Users Extranet VPNs: Suppliers and Customers Branch Office Head Office ISP Telecommuter 4 Partner

When to VPN? Modest Bandwidth Many Locations QoS not Long Critical Distance More Locations, Longer Distances, Less Bandwidth/site, QoS less critical VPN more justifiable Fewer Locations, Shorter Distances, More Bandwidth/site, QoS more critical VPN less justifiable 5

VPN Design Issues 1. Security 2. Address Translation 3. Performance: Throughput, Load balancing (roundrobin DNS), fragmentation 4. Bandwidth Management: RSVP 5. Availability: Good performance at all times 6. Scalability: Number of locations/users 7. Interoperability: Among vendors, ISPs, customers (for extranets) Standards Compatibility, With firewall 6

Design Issues (Cont) 8. Compression: Reduces bandwidth requirements 9. Manageability: SNMP, Browser based, Java based, centralized/distributed 10. Accounting, Auditing, and Alarming 11. Protocol Support: IP, non-ip (IPX) 12. Platform and O/S support: Windows, UNIX, MacOS, HP/Sun/Intel 13. Installation: Changes to desktop or backbone only 14. Legal: Exportability, Foreign Govt Restrictions, Key Management Infrastructure (KMI) initiative Need key recovery 7

Security 101 Integrity: Received = sent? Availability: Legal users should be able to use. Ping continuously No useful work gets done. Confidentiality and Privacy: No snooping or wiretapping Authentication: You are who you say you are. A student at Dartmouth posing as a professor canceled the exam. Authorization = Access Control Only authorized users get to the data 8

Secret Key Encryption Encrypted_Message = Encrypt(Key, Message) Message = Decrypt(Key, Encrypted_Message) Example: Encrypt = division 433 = 48 R 1 (using divisor of 9) Text Ciphertext Key Ciphertext Text 9

Public Key Encryption Invented in 1975 by Diffie and Hellman Encrypted_Message = Encrypt(Key1, Message) Message = Decrypt(Key2, Encrypted_Message) Key1 Text Ciphertext Key2 Ciphertext Text 10

Public Key Encryption RSA: Encrypted_Message = m 3 mod 187 Message = Encrypted_Message 107 mod 187 Key1 = <3,187>, Key2 = <107,187> Message = 5 Encrypted Message = 5 3 = 125 Message = 125 107 mod 187 = 125 (64+32+8+2+1) mod 187 = {(125 64 mod 187)(125 32 mod 187)... (125 2 mod 187)(125)} mod 187 = 5 125 4 mod 187 = (125 2 mod 187) 2 mod 187 11

Public Key (Cont) One key is private and the other is public Message = Decrypt(Public_Key, Encrypt(Private_Key, Message)) Message = Decrypt(Private_Key, Encrypt(Public_Key, Message)) 12

User 1 to User 2: Confidentiality Encrypted_Message = Encrypt(Public_Key2, Encrypt(Private_Key1, Message)) Message = Decrypt(Public_Key1, Decrypt(Private_Key2, Encrypted_Message) Authentic and Private Your Public Key My Private Key Message 13

Firewall: Bastion Host Intranet R1 Bastion Host R2 Internet Bastions overlook critical areas of defense, usually having stronger walls Inside users log on the Bastion Host and use outside services. Later they pull the results inside. One point of entry. Easier to manage security. 14

Proxy Servers Client R2 Proxy Server R1 Internet Server Specialized server programs on bastion host Take user's request and forward them to real servers Take server's responses and forward them to users Enforce site security policy May refuse certain requests. Also known as application-level gateways With special "Proxy client" programs, proxy servers are almost transparent 15

VPN Security Issues Authentication methods supported Encryption methods supported Key Management Data stream filtering for viruses, JAVA, active X Supported certificate authorities (X.509, Entrust, VeriSign) Encryption Layer: Datalink, network, session, application. Higher Layer More granular Granularity of Security: Departmental level, Application level, Role-based 16

Private Addresses 32-bit Address 4 Billion addresses max Subnetting Limit is much lower Shortage of IP address Private addresses Frequent ISP changes Private address Private Not usable on public Internet RFC 1918 lists such addresses for private use Prefix = 10/8, 172.16/12, 192.168/16 Example: 10.207.37.234 17

Address Translation Host 10.1.1.3 10.1.1.2 10.1.1.1 VPN Server NAT Router 164.1.1.1 164.1.1.2 164.1.1.2 R2 Internet NAT = Network Address Translation Like Dynamic Host Configuration Protocol (DHCP) IP Gateway: Like Firewall Tunneling: Encaptulation 18

Tunnel IP Land IP Not Spoken Here IP Land Non-IP Header IP Header Payload Tunnel = Encaptulation Used whenever some feature is not supported in some part of the network, e.g., multicasting, mobile IP 19

VPN Tunneling Protocols GRE: Generic Routing Encaptulation (RFC 1701/2) PPTP: Point-to-point Tunneling Protocol L2F: Layer 2 forwarding L2TP: Layer 2 Tunneling protocol ATMP: Ascend Tunnel Management Protocol DLSW: Data Link Switching (SNA over IP) IPSec: Secure IP Mobile IP: For Mobile users 20

Delivery Header GRE GRE Header Payload Generic Routing Encaptulation (RFC 1701/1702) Generic X over Y for any X or Y Optional Checksum, Loose/strict Source Routing, Key Key is used to authenticate the source Over IPv4, GRE packets use a protocol type of 47 Allows router visibility into application-level header Restricted to a single provider network end-to-end 21

PPTP PPTP Server ISP Network Access Server Client PPTP Tunnel PPTP = Point-to-point Tunneling Protocol Developed jointly by Microsoft, Ascend, USR, 3Com and ECI Telematics PPTP server for NT4 and clients for NT/95/98 MAC, WFW, Win 3.1 clients from Network Telesystems (nts.com) 22

Private Network IP/IPX/NetBEUI Data PPTP Server Public IP Addressing Internal IP Addressing PPTP Packets Internet IP GRE PPP IP/IPX/NetBEUI Data Network Access Server Encrypted Client PPP IP GRE PPP IP/IPX/NetBEUI Data 23

L2TP Layer 2 Tunneling Protocol L2F = Layer 2 Forwarding (From CISCO) L2TP = L2F + PPTP Combines the best features of L2F and PPTP Will be implemented in NT5 Easy upgrade from L2F or PPTP Allows PPP frames to be sent over non-ip (Frame relay, ATM) networks also (PPTP works on IP only) Allows multiple (different QoS) tunnels between the same end-points. Better header compression. Supports flow control 24

IPSec Secure IP: A series of proposals from IETF Separate Authentication and privacy Authentication Header (AH) ensures data integrity and authenticity Encapsulating Security Protocol (ESP) ensures privacy and integrity IP Header Original Original AH ESP IP Header* Data Encrypted Authenticated * Optional 25

IPSec (Cont) Two Modes: Tunnel mode, Transport mode Tunnel Mode Original IP header encrypted Transport mode Original IP header removed. Only transport data encrypted. Supports a variety of encryption algorithms Better suited for WAN VPNs (vs Access VPNs) Little interest from Microsoft (vs L2TP) Most IPSec implementations support machine (vs user) certificates Any user can use the tunnel Needs more time for standardization than L2TP 26

Application Level Security Secure HTTP Secure MIME Secure Electronic Transaction (SET) Private Communications Technology (PCT) 27

Summary VPN allows secure communication on the Internet Three types: WAN, Access, Extranet Key issues: address translation, security, performance Layer 2 (PPTP, L2TP), Layer 3 (IPSec), Layer 5 (SOCKS), Layer 7 (Application level) VPNs QoS is still an issue MPLS 28

References For a detailed list of references, see http://www.cse.ohio-state.edu/~jain/refs/refs_vpn.htm 29