Building Distributed Networks using VPNs David R Newman.

Slides:



Advertisements
Similar presentations
Southampton Open Wireless Network The Topology Talk.
Advertisements

Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Firewalls Presented By Hareesh Pattipati. Outline Introduction Firewall Environments Type of Firewalls Future of Firewalls Conclusion.
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
NetComm Wireless VPN Functionality Feature Spotlight.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 10: Remote Access.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
Virtual Private Networking with OpenVPN Wim Kerkhoff Fraser Valley Linux Users Group April 15, 2004.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Abdullah Alshalan Garrett Drown Team 3 CSE591: Virtualization and Cloud Computing.
EPipe 2344 Product Introduction. Protocols and Bandwidth Control Protocols TCP/IP, RIP, DHCP, TFTP, PPP, PPPoE, IPoE Bandwidth control (site-site) Multilink.
Examining Network Protocols. Overview Introduction to Protocols Protocols and Data Transmissions Common Protocols Other Communication Protocols Remote.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Module 5: Configuring Access for Remote Clients and Networks.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
OpenVPN Vs IPSec measure performance
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
COMP3371 Cyber Security Richard Henson University of Worcester November 2015.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
VPN: Virtual Private Network Presented By: Wesam Shuldhum ID:
Configure and Security Remote Acess. Chapter 8 Advance Computer Network Lecture Sorn Pisey
Presented By Hareesh Pattipati.  Introduction  Firewall Environments  Type of Firewalls  Future of Firewalls  Conclusion.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Administering the SOWN Network David R Newman & Chris Malton.
Virtual Private Networks
Virtual Private Network Access for Remote Networks
Linking Remote Sites With OpenVPN
Virtual Private Networks
Virtual Private Networks
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Microsoft Windows NT 4.0 Authentication Protocols
Virtual Private Networking with OpenVPN
Remote Access Lecture 2.
VPN: Virtual Private Network
Richard Henson University of Worcester November 2016
Configuring and Troubleshooting Routing and Remote Access
IbVPN: Ensures Your Online Safety and Access Blocked Websites
Building Distributed Networks using VPNs David R Newman.
Virtual Private Networks (VPN)
Examining Network Protocols
Virtual Private Network (VPN)
Server-to-Client Remote Access and DirectAccess
Goals Introduce the Windows Server 2003 family of operating systems
VPN: Virtual Private Network
Cengage Learning: Computer Networking from LANs to WANs
Virtual Private Network zswu
OpenVPN zswu.
Internet protocol stack
Presentation transcript:

Building Distributed Networks using VPNs David R Newman

VPN – Virtual Private Network A Definition VPN – Virtual Private Network “ A virtual network that is constructed across the Internet (or other public network) to connect two or more parts of a private network. ”

OSI Model

Types of VPN On top of Data Link Layer On top of Network Layer L2TP/IPsec - Layer 2 Tunnelling Protocol / Internet Protocol security VPLS – Virtual Private LAN Service On top of Network Layer PPTP – Point-to-Point Tunnelling Protocol PPP – Point-to-Point Protocol SSH – Secure Shell VPRN – Virtual Private Routed Network DTLS – Data Transport Layer Security TLS – Transport Layer Security E.g. OpenVPN

Server and Clients

OpenVPN Interfaces

Why OpenVPN? Open Source High connection speed (relative to available bandwidth) Secure Makes it is easy to bypass NATs and Firewalls Well-supported by OpenWRT Extensively configurable

OpenVPN Server (1) server 10.13.112.112 255.255.255.252 local 152.78.189.90 port 5044 proto udp dev tap55 ca /etc/openvpn/package_managment/node_control_2015.crt cert /etc/openvpn/package_managment/server- node_control_2015.crt key /etc/openvpn/package_managment/server- node_control_2015.crt.key dh /etc/openvpn/dh1024.pem push "route 10.12.0.0 255.254.0.0" push "route 152.78.189.82 255.255.255.255" push "dhcp-option DNS 10.13.0.239"

OpenVPN Server (2) client-to-client keepalive 10 120 user openvpn group openvpn persist-key persist-tun log /var/log/openvpn/server55.log status /var/log/openvpn/server55-status.log verb 3 script-security 3 system client-connect "/etc/openvpn/client-routes/connect- node308" client-disconnect "/etc/openvpn/client- routes/disconnect-node308"

OpenVPN Client remote sown-auth2.ecs.soton.ac.uk 5044 proto udp dev tap ca /etc/sown/node_control_2015.crt cert /etc/sown/client.crt key /etc/sown/client.key client nobind resolv-retry infinite user nobody group nogroup persist-key verb 3 script-security 2 down /etc/sown/events/tunnel_down up /etc/sown/events/tunnel_up

Further Reading OSI vs. TCP/IP Model Picking a VPN http://electronicdesign.com/what-s-difference-between/what-s-difference- between-osi-seven-layer-network-model-and-tcpip Picking a VPN http://vpnpick.com/vpn-newbie-guide-picking-openvpn-pptp-l2tp/ https://www.bestvpn.com/blog/4147/pptp-vs-l2tp-vs-openvpn-vs-sstp-vs- ikev2/ OpenVPN Documentation https://openvpn.net/index.php/open-source/documentation OpenVPN on OpenWRT https://wiki.openwrt.org/doc/howto/vpn.openvpn https://wiki.openwrt.org/doc/howto/vpn.client.openvpn.tap Wide Area Wi-Fi https://wiki.openwrt.org/doc/howto/wide.area.wifi

Future SOWN Talks 17th November 2016 After Christmas Firmware Development for Embedded Devices – Chris Malton After Christmas A Mechanism for Global Distributed Authentication – David Newman Administering the SOWN Network – David Newman and Chris Malton

Questions?