1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
IPSec: Authentication Header, Encapsulating Security Payload Protocols CSCI 5931 Web Security Edward Murphy.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Agenda Virtual Private Networks (VPNs) Motivation and Basics Deployment Topologies IPSEC (IP Security) Authentication Header (AH) Encapsulating Security.
Information System Security AABFS-Jordan Summer 2006 IP Security Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi.
Chapter 13 IPsec. IPsec (IP Security)  A collection of protocols used to create VPNs  A network layer security protocol providing cryptographic security.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
WAN Technologies Dial-up modem connections Cheap Slow
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Guide to Network Defense and Countermeasures Second Edition
Configuration of a Site-to-Site IPsec Virtual Private Network Anuradha Kallury CS 580 Special Project August 23, 2005.
Chapter 10 Virtual Private Networks. VPN Defined  A segment of the public network made to appear part of a private network so that it can be used to.
Internet Security Seminar Class CS591 Presentation Topic: VPN.
CCNA 5.0 Planning Guide Chapter 7: Securing Site-to-Site Connectivity
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
VPN – Virtual Private Networking. VPN A Virtual Private Network (VPN) connects the components of one network over another network. VPNs accomplish this.
Network Security Philadelphia UniversitylAhmad Al-Ghoul Module 12 Module 12 Virtual Private Networks  MModified by :Ahmad Al Ghoul  PPhiladelphia.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
VPN Wireless Security at Penn State Rich Cropp Senior Systems Engineer Information Technology Services The Pennsylvania State University © All rights.
Industrial Strength Security for an Insecure World
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Securing Site-to-Site Connectivity Connecting Networks.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
What Is Needed to Build a VPN? An existing network with servers and workstations Connection to the Internet VPN gateways (i.e., routers, PIX, ASA, VPN.
1. Collision domains are unsecure 2. The employees often need to remote access to corporate network resources  The Internet traffic is much more vulnerable.
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 3: VPN and Encryption Technology.
32.1 Chapter 32 Security in the Internet: IPSec, SSL/TLS, PGP, VPN, and Firewalls Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
WAN Technologies Dial-up modem connections
1 Chapter 8 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
An Introduction to Encrypting Messages on the Internet Mike Kaderly INFS 750 Summer 2010.
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration VPNs.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Examining Network Protocols. Overview Introduction to Protocols Protocols and Data Transmissions Common Protocols Other Communication Protocols Remote.
Generic Routing Encapsulation GRE  GRE is an OSI Layer 3 tunneling protocol: Encapsulates a wide variety of protocol packet types inside.
Virtual Private Networks (VPNs) Source: VPN Technologies: Definitions and Requirements. VPN Consortium, July 2008.VPN Technologies: Definitions and Requirements.
FINAL YEAR PROJECT. FINAL YEAR PROJECT IMPLEMENTATION OF VPN USING IPSEC.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Potential vulnerabilities of IPsec-based VPN
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
Virtual Private Network Chapter 4. Lecturer : Trần Thị Ngọc Hoa2 Objectives  VPN Overview  Tunneling Protocol  Deployment models  Lab Demo.
Virtual Private Network (VPN)
V IRTUAL P RIVATE N ETWORKS K ARTHIK M OHANASUNDARAM W RIGHT S TATE U NIVERSITY.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
Network Access for Remote Users Dr John S. Graham ULCC
K. Salah1 Security Protocols in the Internet IPSec.
Virtuelne Privatne Mreže 1 Dr Milan Marković. VPN implementations  In the following sections we will discuss these popular VPN implementation methods,
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Networks
Virtual Private Networks
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Chapter 18 IP Security  IP Security (IPSec)
VPN: Virtual Private Network
Examining Network Protocols
Virtual Private Network (VPN)
Security Protocols in the Internet
VPN: Virtual Private Network
Presentation transcript:

1 IP VPN Nikolay Scarbnik

2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5 VPN types……………………………………………………………6 OSI……………………………………………………………………7 VPNs classification………………………………………………….8 Example:IPSec Tunnel Mode…………………………………………10 VPN example- IPSec………………………………………………11 IPSec Overview…………………………………………………….12 Algorithms for encryption … ……………...…………………………11 Public Key Encryption……………………………………………...14 Diffie-Hellman Key Exchange……………………………………..15 IPSec Security Protocols…………………………………………..16 IPSec AH & ESP …………………………………………….………17 Secure Protocol- ESP……………………………………………...18 Secure Protocol- AH………………………………………………..20 References…………………………………………………………..22

3 Introduction This project describes VPNs, or Virtual Private Networks. I’ll try to briefly describe the main components, technologies and advantages. The audience is expected to have some basic knowledge the TCP/IP protocols, as well as general security concepts.

4 VPN concept definition VPN- Virtual Private Network. The VPN concept is all about combining several separated Private Networks using public infrastructure. Virtual- because it’s dynamic connection over public infrastructure. Private- data security is preserved. Network- connects several LANs or single computers to a mainframe/LAN

5 VPN advantages Cost saving. Accessibility& secure connection. Application transparent.

6 VPN types PPTP- point-to-point tunneling protocol L2F- layer-2 forwarding L2TP- layer-2 tunneling protocol IPSec- IP security protocol GRE- generic routing encapsulation MPLS- multiprotocol label switching ATM- asynchronous transfer mode Frame Relay

7 7 Layers Model VPN uses the 2’nd or the 3’d layer of the OSI model.

8 VPNs classification Layer 2 VPN P2P over VC ATM Frame Relay Layer 3 VPN P2P, Any2Any GREMPLSIPSec

9 VPNs classification ATM Site-to-site VPNs Static Frame Relay GREMPLS Remote access VPNs Dynamic IPSecLT2P

10 Example:IPSec Tunnel Mode

11 VPN example- IPSec Whats IPSec? IPSecs goal is to secure IP packets (IPv6/v4). What is it good for? IPSec provides authentication, integrity, access control, and confidentiality.

12 IPSec Overview Fundamental components of IPSec : Algorithms for encryption Key management ISAKMP, IKE, SKEME Security protocols Authentication header (AH) and encapsulation security payload (ESP)

13 Algorithms for encryption Symmetric Algorithms: DES, 3DES, and AES. Asymmetric Algorithms-public key algorithms: IKE (Internet Key Exchange ) In 1999, the DES key was cracked in less than 24 hours by using an exhaustive key search. IPSec

14 Public Key Encryption

15 Diffie-Hellman Key Exchange

16 IPSec Security Protocols Encapsulating security payload (ESP) Authentication header (AH) >> IP datagram security <<

17 IPSec AH & ESP Packet in IPSec Transport Mode IP Packet in IPSec Tunnel Mode

18 Secure Protocol- ESP IP Packet Protected by ESP

19 Secure Protocol- ESP IP Packet Protected by ESP in Transport Mode IP Packet Protected by ESP in Tunnel Mode

20 Secure Protocol- AH AH provides: connectionless integrity, data authentication, and optional replay protection. IP Packet Protected by AH

21 Secure Protocol- AH IP Packet Protected by AH in Transport Mode IP Packet Protected by AH in Tunnel Mode

22 References Cisco Press IPSec VPN Design Cisco - Safe VPN - IPSec In Depth