Virtual Private Network (VPN) © N. Ganesan, Ph.D..

Slides:



Advertisements
Similar presentations
UNIVERSITY OF EDUCATION BY H.M.ISHTIAQ RAFIQUE. Domain Name Structure.
Advertisements

1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
4.1 Configuring Network Access Components of a Network Access Services Infrastructure What is the Network Policy and Access Services Role? What is Routing.
Module 5: Configuring Access for Remote Clients and Networks.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Module 10: Configuring Virtual Private Network Access for Remote Clients and Networks.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
70-270, MCSE/MCSA Guide to Installing and Managing Microsoft Windows XP Professional and Windows Server 2003 Chapter Twelve Implementing Terminal.
Chapter 8: Configuring Network Connectivity. Installing Network Adapters Network adapter cards connect a computer to a network. Installation –Plug and.
VPN – Virtual Private Networking. VPN A Virtual Private Network (VPN) connects the components of one network over another network. VPNs accomplish this.
Remote Networking Architectures
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Overview of Routing and Remote Access Service (RRAS) When RRAS was implemented in Microsoft Windows NT 4.0, it added support for a number of features.
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
Chapter 11: Dial-Up Connectivity in Remote Access Designs
Implementing RADIUS AAA Phil & Rick. Content Terms and Concepts Access Control What is AAA? Benefits of AAA What is RADIUS? Microsoft IAS Overview Installation.
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
VPN Scenarios © N. Ganesan, Ph.D.. Chapter Objectives.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
Virtual Private Networks Alberto Pace. IT/IS Technical Meeting – January 2002 What is a VPN ? u A technology that allows to send confidential data securely.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Windows Server 2008 Chapter 9 Last Update
Configuring Routing and Remote Access(RRAS) and Wireless Networking
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Module 6: Configuring and Troubleshooting Routing and Remote Access
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
1 Chapter Overview Installing the TCP/IP Protocols Configuring TCP/IP.
1 Chapter Overview Using the New Connection Wizard to configure network and Internet connections Using the New Connection Wizard to configure outbound.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Week 6 – NPS and RADIUS Install and Configure a Network Policy Server Configure RADIUS Clients and Servers NPS Authentication Methods Monitor and Troubleshoot.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Page 1 TCP/IP Networking and Remote Access Lecture 9 Hassan Shuja 11/23/2004.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Network Infrastructure Microsoft Windows 2003 Network Infrastructure MCSE Study Guide for Exam
Routing with Windows Server 2003 Chapter 9. Objectives for this Chapter Manage Routing And Remote Access routing interfaces Manage packet filters Manage.
Using Routing and Remote Access Chapter Five. Exam Objectives in this Chapter:  Plan a routing strategy Identify routing protocols to use in a specified.
4.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 12: Implementing Security.
Configure and Security Remote Acess. Chapter 8 Advance Computer Network Lecture Sorn Pisey
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Windows Vista Configuration MCTS : Advanced Networking.
Virtual Private Networks
Module 9: Configuring Network Access
Virtual Private Network (VPN)
Microsoft Windows NT 4.0 Authentication Protocols
Virtual Private Networks
Virtual Private Network (VPN)
Server-to-Client Remote Access and DirectAccess
Goals Introduce the Windows Server 2003 family of operating systems
Presentation transcript:

Virtual Private Network (VPN) © N. Ganesan, Ph.D.

Chapter Objectives

Chapter Modules

Primary Reference VPN Overview by Microsoft

VPN A virtual private network that is established over, in general, the Internet It is virtual because it exists as a virtual entity within a public network It is private because it is confined to a set of private users

Why is it a Virtual Private Network? From the user’s perspective, it appears as a network consisting of dedicated network links These links appear as if they are reserved for the VPN clientele Because of encryption, the network appears to be private

Example of a VPN

VPN Major Characteristics Must emulate a point-to-point link –Done by encapsulating the data that would facilitate allow it to travel the Internet to reach the end point Must emulate a private link –Done by encrypting the data in the data packets

Typical VPN Connection

Tunnel and Connections Tunnel –The portion of the network where the data is encapsulated Connection –The portion of the network where the data is encrypted

Application Areas In general, provide users with connection to the corporate network regardless of their location The alternative of using truly dedicated lines for a private network are expensive propositions

Some Common Uses of VPN Provide users with secured remote access over the Internet to corporate resources Connect two computer networks securely over the Internet –Example: Connect a branch office network to the network in the head office Secure part of a corporate network for security and confidentiality purpose

Remote Access Over the Internet

Connecting Two Computer Networks Securely

Securing a Part of the Corporate Network

Basic VPN Requirements User Authentication Address Management Data Encryption Key Management Multi-protocol Support

User Authentication VPN must be able to verify user authentication and allow only authorized users to access the network

Address Management Assign addresses to clients and ensure that private addresses are kept private on the VPN

Data Encryption Encrypt and decrypt the data to ensure that others on the not have access to the data

Key Management Keys must be generated and refreshed for encryption at the server and the client Note that keys are required for encryption

Multi-protocol Support The VPN technology must support commons protocols on the Internet such as IP, IPX etc.

VPN Implementation Protocols Point-to-Point Tunneling Protocol (PPTP) of Layer 2 Tunneling Protocol (L2TP) IPSec

More on Tunneling Tunneling involves the encapsulation, transmission and decapsulation of data packets The data is encapsulated with additional headers The additional headers provide routing information for encapsulated data to be routed between the end points of a tunnel

Tunneling

Point-to-Point Tunneling Protocol (PPTP) Encapsulate and encrypt the data to be sent over a corporate or public IP network

Level 2 Tunneling Protocol Encrypted and encapsulated to be sent over a communication links that support user datagram mode of transmission –Examples of links include X.25, Frame Relay and ATM

IPSec Tunnel Mode Encapsulate and encrypt in an IP header for transmission over an IP network

Layer 2 Tunneling Protocols PPTP L2TP Both encapsulate the payload in a PPP frame

Layer 3 Tunneling Protocol IPSec Tunneling Mode –Encapsulates the payload in an additional IP header

PPP Format

PPTP Format

L2TP Format

Windows Implementation of VPN L2TP for tunneling IPSec for encryption Known as L2TP/IPSec

Windows Implementation

IPSec Tunnel Mode Supports only IP networks

Tunnel Types Voluntary –VPN request is initiated by the client –The client remains the end point Compulsory –VPN access server creates a compulsory tunnel for the client –In this case, the dial-up access server between the user’s computer and the tunnel server is the tunnel end point that acts as a client

The Choice Voluntary tunneling is used in most applications

Other Important Protocols in VPN Microsoft Point-to-Point Encryption (MPPE) Extensible Authentication Protocol (EAP) Remote Authentication Dial-in User Service (RADIUS)

A Note on RADIUS

Keys Symmetric Keys Asymmetric Keys

Summary

End of Module

VPN Scenarios © N. Ganesan, Ph.D.

Chapter Objectives

Chapter Modules

Reference

Some Example Scenarios VPN remote access for employees. On-demand branch office access. Persistent branch office access. Extranet for business partners. Dial-up and VPNs with RADIUS authentication

VPN Remote Access for Employees

Router-to-Router Branch Office Connection

Branch Office Connection (Router- to-Router)

VPN Based Extranet

Dial-up and VPNS with RADIUS Authentication

Module Configuring a VPN Environment

Test Scenario

Component Details A computer running Windows Server 2003, Enterprise Edition, named DC1 that is acting as a domain controller, a Domain Name System (DNS) server, a Dynamic Host Configuration Protocol (DHCP) server, and a certification authority (CA). A computer running Windows Server 2003, Standard Edition, named VPN1 that is acting as a VPN server. VPN1 has two network adapters installed. A computer running Windows Server 2003, Standard Edition, named IAS1 that is acting as a Remote Authentication Dial-in User Service (RADIUS) server.

Component Details Cont. A computer running Windows Server 2003, Standard Edition, named IIS1 that is acting as a Web and file server. A computer running Windows XP Professional named CLIENT1 that is acting as a VPN client.

Private and Public Networks Private – /24 Simulated Public – /24

DC1 DC1 is a computer running Windows Server 2003, Enterprise Edition that is providing the following services: –A domain controller for the example.com Active Directory domain –.A DNS server for the example.com DNS domain. –A DHCP server for the intranet network segment –The enterprise root certification authority (CA) for the example.com domain.

Step 1: Configuring DC1 The first step is to configure the following –Active Directory –DNS –DHCP –CA

Step 2: Configure IAS1 Install Windows Server –Provides RADIUS authentication, authorization, and accounting for VPN1 Register server in active directory Configure new remote access policies Specify authentication method and encryption level

Step 3: Configure IIS1 Configure this as a web server for web access as well as file sharing

Step 4: Configure VPN1 Install VPN1 as a member server in the domain Configure TCP/IP for the Intranet and Internet sides Configure and enable routing and remote access Setup the server to work with a RADIUS server Setup the DHCP relay agent parameters

Step 5: Configure Client1 CLIENT1 is a computer running Windows XP Professional that is acting as a VPN client and gaining remote access to intranet resources across the simulated Internet. To configure CLIENT1 as a VPN client for a PPTP connection, perform the following steps:

1.Connect CLIENT1 to the intranet network segment. 2.On CLIENT1, install Windows XP Professional as a member computer named CLIENT1 of the example.com domain. 3.Add the VPNUser account in the example.com domain to the local Administrators group. 4.Log off and then log on using the VPNUser account in the example.com domain.

5.From Control Panel-Network Connections, obtain properties on the Local Area Network connection, and then obtain properties on the Internet Protocol (TCP/IP). 6.Click the Alternate Configuration tab, and then click User configured. 7.In IP address, type In Subnet mask, type This is shown in the following figure.

8.Click OK to save changes to the Internet Protocol (TCP/IP). Click OK to save changes to the Local Area Network connection. 9.Shut down the CLIENT1 computer. 10.Disconnect the CLIENT1 computer from the intranet network segment, and connect it to the simulated Internet network segment.

11.Restart the CLIENT1 computer and log on using the VPNUser account. 12.On CLIENT1, open the Network Connections folder from Control Panel. 13.In Network Tasks, click Create a new connection. 14.On the Welcome to the New Connection Wizard page of the New Connection Wizard, click Next. 15.On the Network Connection Type page, click Connect to the network at my workplace. This is shown in the following figure.

19.Click Next. On the Connection Availability page, click Next. 20.On the Completing the New Connection Wizard page, click Finish. The Connect PPTPtoCorpnet dialog box is displayed. This is shown in the following figure.

21.Click Properties, and then click the Networking tab. 22.On the Networking tab, in Type of VPN, click PPTP VPN. This is shown in the following figure

23.Click OK to save changes to the PPTPtoCorpnet connection. The Connect PPTPtoCorpnet dialog box is displayed. 24.In User name, type example/VPNUser. In Password, type the password you chose for the VPNUser account. This is shown in the following figure.

25.Click Connect. 26.When the connection is complete, run Internet Explorer. 27.If prompted by the Internet Connection Wizard, configure it for a LAN connection. In Address, type You should see a Windows XP graphic. 28.Click Start, click Run, type \\IIS1\ROOT, and then click OK. You should see the contents of the Local Drive (C:) on IIS1. 29.Right-click the PPTPtoCorpnet connection, and then click Disconnect.

End of Chapter