1 Configuring Virtual Private Networks for Remote Clients and Networks.

Slides:



Advertisements
Similar presentations
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Advertisements

Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
Module 5: Configuring Access to Internal Resources.
Module 5: Configuring Access for Remote Clients and Networks.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Module 10: Configuring Virtual Private Network Access for Remote Clients and Networks.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Virtual Private Networking Karlene R. Samuels COSC513.
Remote Networking Architectures
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Virtual Private Network
NetComm Wireless VPN Functionality Feature Spotlight.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
VPN Scenarios © N. Ganesan, Ph.D.. Chapter Objectives.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Configuring Routing and Remote Access(RRAS) and Wireless Networking
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
Module 8: Configuring Virtual Private Network Access for Remote Clients and Networks.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
Generic Routing Encapsulation GRE  GRE is an OSI Layer 3 tunneling protocol: Encapsulates a wide variety of protocol packet types inside.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Virtual Private Network (VPN)
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
Virtual Private Networks Manraj Sekhon. What is a VPN?
VPN: Virtual Private Network Presented By: Wesam Shuldhum ID:
Securing Access to Data Using IPsec Josh Jones Cosc352.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Network
Virtual Private Network Access for Remote Networks
Virtual Private Networks
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
VPN: Virtual Private Network
Virtual Private Network (VPN)
Server-to-Client Remote Access and DirectAccess
VPN: Virtual Private Network
Topic 12: Virtual Private Networks
Presentation transcript:

1 Configuring Virtual Private Networks for Remote Clients and Networks

2 What Is Virtual Private Networking? Virtual private networking allows secure remote access to resources on an organization’s internal network for users outside the network A VPN is a virtual network that enables communication between a remote access client and computers on the internal network or between two remote sites separated by a public network such as the Internet

3 Types of VPNs Remote Access VPN – Provides access to internal corporate network over the Internet – Reduces long distance, modem bank, and technical support costs Internet Corporate Site

4 Types of VPN Site-to-Site VPN – Connects multiple offices over Internet – Reduces dependencies on frame relay and leased lines Internet Branch Office Corporate Site

5 Types of VPN Extranet VPN – Provides business partners access to critical information (leads, sales tools, etc) – Reduces transaction and operational costs Corporate Site Internet Partner #1 Partner #2

6 What a VPN needs VPNs must be encrypted – so no one can read it VPNs must be authenticated No one outside the VPN can alter the VPN All parties to the VPN must agree on the security properties

7 VPN Topology Operates at layer 2 or 3 of OSI model – Layer 2 frame – Ethernet – Layer 3 packet – IP Tunneling – allows senders to encapsulate their data in IP packets that hide the routing and switching infrastructure of the Internet – to ensure data security against unwanted viewers, or hackers

8 VPN Components Protocols: IP Security (IPSec) – Transport mode – Tunnel mode Point-to-Point Tunneling Protocol (PPTP) – Voluntary tunneling method – Uses PPP (Point-to-Point Protocol)

9 VPN Components Protocols: Layer 2 Tunneling Protocol (L2TP) – Exists at the data link layer of OSI – Composed from PPTP and L2F (Layer 2 Forwarding) – Compulsory tunneling method

10 VPN Components Security: Authentication – Determine if the sender is the authorized person and if the data has been redirect or corrupted – User/System Authentication – Data Authentication

11 VPN Components

12 Configuring Virtual Private Networking for Remote Clients

13 Creating a Remote Access PPTP VPN Server Enabling the ISA Firewall’s VPN Server component Creating an Access Rule allowing VPN Clients access to the Internal network Enabling Dial-in Access for VPN User Accounts Testing a PPTP VPN Connection

14 Enable the VPN Server Enable VPN Client Access Warning About address assignment

15 Assigning IP Address Assignment for Remote Users Remote users that will be establishing a VPN tunnel require an IP address to properly communicate through the tunnel to the internal network

16 Authenticating VPN Users Authenticating directly against Active Directory Implement RADIUS Authentication Authenticate against local users

17 Working with and Creating Rules for the VPN Clients Network create default rules that allow VPN clients access into the network create default rules that allow VPN clients access into the network

18 RADIUS Authentication for VPN Connections Install the Internet Authentication Service (IAS) for Active Directory RADIUS Support

19 Setting Up the ISA Server as an IAS Client Define a RADIUS server shared key

20 Configuring ISA to Use IAS for Authentication Define a RADIUS server shared key in ISA Modify RADIUS server settings for VPN client access

21 Configuring an ISA VPN Connection to Use PPTP

22 Creating Layer 2 Tunneling Protocol (L2TP) VPN Enter an IPSec pre-shared key.

23 Creating a Public Key Infrastructure (PKI) for L2TP with IPSec Support Installing the Enterprise Root Certificate Authority (CA) Configuring the Enterprise Root CA Requesting a Certificate for the ISA VPN Server Requesting a Certificate for the VPN Client Downloading the CA Certificate Exporting and Importing Certificates

24 Configuring Virtual Private Networking for Remote Sites

25 Site-to-Site VPN Capabilities Point-to-Point Tunneling Protocol (PPTP) Layer 2 Tunneling Protocol (L2TP) IPSec Tunnel Mode

26 Preparing ISA Servers for Site-to-Site VPN Capabilities Define the IP Address Assignment Enable VPN client access Create local VPN user accounts on both servers, and enable dial-in access for those accounts. Run through the Site-to-Site VPN wizard to configure all necessary networks, network rules, and access rules. Repeat the steps on the remote server.

27 Create VPN Site-to-Site

28 Configuring a Point-to-Point Tunneling Protocol (PPTP) Site-to-Site VPN Between Two Remote Offices Create a PPTP Site-to-Site VPN Connection

29 Configuring a Layer 2 Tunneling Protocol (L2TP) Site-to-Site VPN Deciding Between Shared Key and PKI Configuring a PKI Infrastructure for PKI-Based Certificate Encryption Requesting a Certificate for the ISA VPN Server Creating an L2TP/IPSec Site-to-Site VPN Connection

30 Setting Up an IPSec Tunnel Mode VPN Connection