Guide to Network Defense and Countermeasures Second Edition

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

FIREWALLS Chapter 11.
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
11 Setting Up a Virtual Private Network
Agenda Virtual Private Networks (VPNs) Motivation and Basics Deployment Topologies IPSEC (IP Security) Authentication Header (AH) Encapsulating Security.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
FIREWALLS The function of a strong position is to make the forces holding it practically unassailable —On War, Carl Von Clausewitz On the day that you.
Cosc 4765 Network Security: Routers, Firewall, filtering, NAT, and VPN.
Module 5: Configuring Access for Remote Clients and Networks.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Guide to Network Defense and Countermeasures Second Edition
Firewall Configuration Strategies
Guide to Network Defense and Countermeasures Second Edition
Principles of Information Security, 2nd Edition1 Firewalls and VPNs.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Internet Protocol Security (IPSec)
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Design Elements for Perimeter Security UNIT-10. Firewall and Router  The firewall and the router are two of the most common perimeter security components.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
1 Guide to Network Defense and Countermeasures Chapter 7.
Chapter 11: Setting up a Virtual Private Network.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Intranet, Extranet, Firewall. Intranet and Extranet.
Network Security Essentials Chapter 11 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
Chapter 6: Packet Filtering
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
SECURITY ZONES. Security Zones  A security zone is a logical grouping of resources, such as systems, networks, or processes, that are similar in the.
11 SECURING YOUR NETWORK PERIMETER Chapter 10. Chapter 10: SECURING YOUR NETWORK PERIMETER2 CHAPTER OBJECTIVES  Establish secure topologies.  Secure.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Guide to Firewalls and VPNs, 3 rd Edition Chapter Ten Setting Up A Virtual Private Network.
Chapter 2 Network Topology
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
© 2006 Cisco Systems, Inc. All rights reserved. Cisco IOS Threat Defense Features.
Module 8: Planning and Troubleshooting IPSec. Overview Understanding Default Policy Rules Planning an IPSec Deployment Troubleshooting IPSec Communications.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Firewall Security.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Module 5: Designing Security for Internal Networks.
Module 1: Configuring Routing by Using Routing and Remote Access.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Introducing Network Design Concepts Designing and Supporting Computer Networks.
Security fundamentals Topic 10 Securing the network perimeter.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 10: Planning and Managing IP Security.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Guide to Network Defense and Countermeasures Third Edition
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Securing Access to Data Using IPsec Josh Jones Cosc352.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Creating the Network Design Designing and Supporting Computer Networks – Chapter.
Security fundamentals
Firewalls Routers, Switches, Hubs VPNs
Presentation transcript:

Guide to Network Defense and Countermeasures Second Edition Chapter 6 VPN Implementation

Objectives Explain design considerations for a VPN Describe options for VPN configuration Explain how to set up VPNs with firewalls Explain how to adjust packet-filtering rules for VPNs Describe guidelines for auditing VPNs and VPN policies Guide to Network Defense and Countermeasures, Second Edition

Designing a VPN Assess organization’s needs and goals Type of business How many employees it has Infrastructure already in place Security required Enforce security on the client side of the VPN tunnel Most difficult aspect of the design process Guide to Network Defense and Countermeasures, Second Edition

Business Needs Business processes Determine how you will implement a VPN strategy Careful analysis of the existing infrastructure Helps you integrate the VPN with minimal disruption VPNs can be classified as site-to-site or client-to-site Can offer cost-effective, secure connectivity Legal implications to failing to secure access to a remote network Guide to Network Defense and Countermeasures, Second Edition

Business Needs (continued) Nature of the business What does it do? What product or service does it sell? Who are its customers? Cost is usually a key factor Narrows the choices of hardware and software Guide to Network Defense and Countermeasures, Second Edition

Business Needs (continued) Nature of the business A secure VPN design should address: Secure connectivity Availability Authentication Secure management Reliability Scalability Performance Guide to Network Defense and Countermeasures, Second Edition

Client Security Several ways to increase VPN client security Split tunneling Describes multiple paths One path goes to the VPN server and is secured Another unauthorized and unsecured path permits users to connect to the Internet While still connected to the corporate VPN Leaves the VPN server and internal LAN vulnerable to attack Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Client Security (continued) Planning VPN deployment Consider the existing infrastructure Make a network map Decide on the placement of VPN servers Research hardware and software to use Decide whether you need new hardware or software Sometimes you can reconfigure existing resources to support a VPN Develop a list of requirements When you meet a vendor so nothing is overlooked Follow security policy guidelines Guide to Network Defense and Countermeasures, Second Edition

Configuring VPNs Define a VPN domain Set of one or more computers that VPN hardware and software handle as a single entity Computers in a VPN domain use the VPN to communicate with another domain Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Single and Multiple Entry Point Configurations Determine whether network gateway will be included in the VPN domain Depends on whether your network has a site-to-site or client-to-site VPN configuration Single entry point configuration Typically used by small networks All traffic to and from the network passes through a single gateway Gateway must be a member of the VPN domain Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Single and Multiple Entry Point Configurations (continued) Typically used by large organizations Multiple gateways are used Each with a VPN tunnel connecting a different location Gateway must be excluded from the VPN domain Otherwise all traffic will be encrypted reducing performance unnecessarily Make sure VPN domains do not overlap Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

VPN Topology Configurations How components in a network are connected physically to one another Determines how gateways, networks, and clients are related to each other Corresponds to the basic physical and logical topologies of any network Guide to Network Defense and Countermeasures, Second Edition

VPN Topology Configurations (continued) Mesh topology All participants in the VPN have Security Associations (SAs) with one another Types of mesh arrangements Full mesh Every subnetwork is connected to all other subnets in the VPN Complex to manage Partial mesh Any subnet in the VPN may or may not be connected to the other subnets Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

VPN Topology Configurations (continued) Star topology Also known as a hub-and-spoke configuration VPN gateway is the hub Networks that participate in the VPN are called rim subnetworks Separate SAs are made between the hubs of each rim subnetwork in the star configuration Central VPN router is at organization’s central office Any LANs or computers that want to participate need to connect only to the central server Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

VPN Topology Configurations (continued) Hybrid topology Combines two different network topologies Central core uses a mesh topology Mesh topologies tend to operate more efficiently Branch offices can be connected using a star topology Benefits from strengths of each topology Scalability (of the star topology) Speed (of the mesh configuration) Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Using VPNs with Firewalls VPNs do not reduce the need for a firewall Always use a firewall as part of VPN security design Install VPN software on the firewall itself Firewall allows outbound access to the Internet Firewall prevents inbound access from the Internet VPN service encrypts traffic to remote clients or networks Guide to Network Defense and Countermeasures, Second Edition

Using VPNs with Firewalls (continued) Install VPN software on the firewall itself Advantages Control all network access security from one server Fewer computers to manage Use the same tools for VPN and firewall Disadvantages Single point of failure Must configure routes carefully Internet access and VPN traffic compete for resources on the server Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Using VPNs with Firewalls (continued) Set up VPN parallel to your firewall inside the DMZ Advantages No need to modify firewall settings to support VPN traffic Configuration scales more easily Can deal with congested servers Disadvantages VPN server is connected directly to the Internet If VPN server becomes compromised, attacker will have direct access to your internal network Cost of supporting a VPN increases with new servers Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Using VPNs with Firewalls (continued) Set up VPN server behind the firewall connected to the internal network Advantages VPN server is completely protected from the Internet Firewall is the only device controlling access VPN traffic restrictions are configured on VPN server Disadvantages VPN traffic must travel through the firewall Firewall must handle VPN traffic Firewall might not know what to do with IP protocols other than ICMP, TCP, and UDP Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Adjusting Packet-Filtering Rules for VPNs Perimeter firewall filters packets VPN sends or receives Packet filtering is based on header fields of inbound and outbound packets IP packet header fields used by packet filtering Source address Destination address Protocol identifier You can conduct packet filtering based on any or all of these header fields Guide to Network Defense and Countermeasures, Second Edition

PPTP Filters PPTP First widely supported VPN protocol Supports legacy authentication methods Does not require PKI Might be only option when VPN connections pass through NAT PPTP uses two protocols TCP GRE Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

L2TP and IPSec Filters Need to set up rules that permit IPSec traffic IKE uses protocol ID 171 and UDP on port 500 ESP uses protocol ID 50 AH uses protocol ID 51 Guide to Network Defense and Countermeasures, Second Edition

Guide to Network Defense and Countermeasures, Second Edition

Auditing VPNs and VPN Policies Auditing needed to make sure organizations have a well-define VPN policy Access policies define standards for connecting to the organization’s network Must be integrated with the security policy Policies should be defined for different levels of restrictions VPN endpoints are as vulnerable as internal network computers Endpoints should also use antivirus software and personal firewalls Guide to Network Defense and Countermeasures, Second Edition

Auditing VPNs and VPN Policies (continued) Test each client that will connect to your LAN Helps prevent network threats You can standardize VPN client for remote users Third-party solutions Cisco Secure VPN Client Nokia VPN Client SonicWALL VPN Client Verify everything is working according to your policies Guide to Network Defense and Countermeasures, Second Edition

Summary Business nature helps determine your VPN requirements Decide placement of VPN servers Research hardware and software to use Establish a VPN domain VPN configurations Single entry point configurations Multiple entry point configurations VPNs need to be used with firewalls Guide to Network Defense and Countermeasures, Second Edition

Summary (continued) Adjust packet-filtering rules To allow PPTP, L2TP, and IPSec traffic Auditing VPNs and VPN policies After you have installed and configured your VPN Work with a knowledgeable remote user Helps determine a baseline for future auditing, testing, and troubleshooting Guide to Network Defense and Countermeasures, Second Edition