1 © J. Liebeherr, All rights reserved Virtual Private Networks.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Guide to Network Defense and Countermeasures Second Edition
Virtual Private Networks and IPSec
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Virtual Private Networking Karlene R. Samuels COSC513.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
VPN – Virtual Private Networking. VPN A Virtual Private Network (VPN) connects the components of one network over another network. VPNs accomplish this.
Remote Networking Architectures
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Network Security Philadelphia UniversitylAhmad Al-Ghoul Module 12 Module 12 Virtual Private Networks  MModified by :Ahmad Al Ghoul  PPhiladelphia.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
Virtual Private Network
MCTS GUIDE TO MICROSOFT WINDOWS 7 Chapter 14 Remote Access.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Securing Site-to-Site Connectivity Connecting Networks.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
Virtual Private Networks Alberto Pace. IT/IS Technical Meeting – January 2002 What is a VPN ? u A technology that allows to send confidential data securely.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
1. Collision domains are unsecure 2. The employees often need to remote access to corporate network resources  The Internet traffic is much more vulnerable.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
Remote Access Chapter 4. IEEE 802.1x An internet standard created to perform authentication services for remote access to a central LAN. An internet standard.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration VPNs.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
© 2006 Cisco Systems, Inc. All rights reserved. Optimizing Converged Cisco Networks (ONT) Module 4: Implement the DiffServ QoS Model.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Guide to Firewalls and VPNs, 3 rd Edition Chapter Ten Setting Up A Virtual Private Network.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
PPTP Point-to-Point Tunneling Protocol (PPTP) –Problem: PPP was created for dialing into a local RAS server –But the site’s RAS may be far away –Long-distance.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Virtual Private Network (VPN)
V IRTUAL P RIVATE N ETWORKS K ARTHIK M OHANASUNDARAM W RIGHT S TATE U NIVERSITY.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks
Virtual Private Network
Virtual Private Networks and IPSec
Virtual Private Networks
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Remote Access Lecture 2.
Virtual Private Network (VPN)
VPN: Virtual Private Network
Virtual Private Network zswu
Topic 12: Virtual Private Networks
Presentation transcript:

1 © J. Liebeherr, All rights reserved Virtual Private Networks

2 © J. Liebeherr, All rights reserved 10/22/05 Goal of VPN The goal of a Virtual Private Network (VPN) is to provide private communications within the public Internet Infrastructure VPNs apply various networking technologies to achieve the goal The basic concepts: –Build a virtual overlay network that is run on top of the infrastructure of the Internet –“Virtual” means that there is not new infrastructure –Connect private networks by the overlay networks

3 © J. Liebeherr, All rights reserved 10/22/05 Why is there a need for VPN? Internet has insufficient security mechanisms –IP packets are not authenticated or encrypted –Users with access to network can read content of IP traffic Application layer solutions not always suitable –Secure Web access, secure mail clients, secure file transfer, and secure terminal applications are only point-to- point solutions and assume client/server relationship –Application-layer solutions require that each application is protected in isolation  Does not secure networks

4 © J. Liebeherr, All rights reserved 10/22/05 VPN Overlay Network

5 © J. Liebeherr, All rights reserved 10/22/05 Tunneling VPN routers connect via IP tunnels With tunneling, IP packets are encapsulated by another IP header (IP-in-IP encapsulation)

6 © J. Liebeherr, All rights reserved 10/22/05 VPN Security VPNs use many security mechanisms –Authentication: Identify VPN users and devices –Access control: Ensure authorized use of VPN resources –Data security: Use cryptography to obscure content transmitted over VPN

7 © J. Liebeherr, All rights reserved 10/22/05 Components of a VPN Solution VPN Gateway: Located at the corporate network perimeter, the gateway performs tunneling, authentication, access control, and data security. Sometimes, VPN gateway functions can be integrated in to a router or firewall VPN Client: Software used for remote VPN access Creates a secure path from a remote client computer to a VPN gateway

8 © J. Liebeherr, All rights reserved 10/22/05 VPN Architectures VPN architectures can be separated into three scenarios: 1.Site-to-Site Intranet VPN: –Multiple network sites at different locations within the same organization are connected using a VPN to form a larger corporate network 2.Remote Access VPN: –Connect a single remote device to a corporate intranetwork 3.Extranet VPN: –Network resources within a corporate nework are oppend for access for dedicated purposes

9 © J. Liebeherr, All rights reserved 10/22/05 Site-to-Site Intranet VPN VPN tunnels establish secure communication links

10 © J. Liebeherr, All rights reserved 10/22/05 Remote Access VPN Also called: Virtual Private Dial Network (VPDN)

11 © J. Liebeherr, All rights reserved 10/22/05 Extranet VPN

12 © J. Liebeherr, All rights reserved 10/22/05 VPN Tunneling Protocols Role of VPN tunnels: 1.Encapsulation of messages 2.Privately address packets through public infrastructure 3.Provide data integrity and confidentiality –Layer-2 tunneling protocols carry Point-to-Point (PPP) frames through IP networks –PPP: –PPP is used to send IP packets over serial connections –Used extensively for point-to-point data links (dial-in) –Can provide authentication PPP frame

13 © J. Liebeherr, All rights reserved 10/22/05 Layer-2 Tunneling Protocol Developed to facilitate PPP access by remote computers to a private network over an IP-based network Remote Dial-in: Remote Access Service (RAS) provides banks of phone lines for connecting remote users Remote system calls up and establishes PPP connection to RAS service With Layer-2 tunneling: Approach: Tunnel PPP packets through Internet Access concentrator (possibly inside the remote system) encapsulates PPP frames Network server terminates VPN tunnel

14 © J. Liebeherr, All rights reserved 10/22/05 Layer-2 Tunneling Protocols Point-to-Point Tunneling Protocol (PPTP): –Developed by Microsoft, 3Com, US Robotics, and others –Goal: Provide VPN between remote access users and network servers –Approach: Tunneling on client systems Layer-2 Forwarding Protocol (L2F): –Developed by Cisco, Nortel and others –Virtual dial-up protocol for managed networks –Approach: Tunneling is performed as a network service (not by client) Layer-2 Tunneling Protocol (L2TP): –Developed within the IETF –Combines concepts of PPTP and L2F

15 © J. Liebeherr, All rights reserved 10/22/05 Remote Dial-in Layer-2 Tunneling Protocol Assumes the Layer-2 tunneling protocol PPTP: User does remote dial-in to ISP and establishes PPP connection Establish a (TCP) connection to set up a control channel Establish a PPTP tunnel Establish PPP tunnel that sends PPP frames over the PPTP tunnel IP packets are carried in PPP frames

16 © J. Liebeherr, All rights reserved 10/22/05 Encapsulation at remote client PayloadIP header Original IP packet PayloadIP header PPP encapsulation to remote Network Server PPPPayloadIP header GRE header is used by PPTP PPPGRE headerPayloadIP header IP header for public Internet PPPGRE headerIP headerPayloadIP header PPP encapsulation to ISP Network Server PPPGRE headerIP headerPPP

17 © J. Liebeherr, All rights reserved 10/22/05 Other VPN approaches IPSec: –Protocol suite for secure communications at Layer-3 –Consists of security headers and a set of protocols –Originally designed for IPv6 –Performs services for authentication, integrity, confidentifality –Can perform tunneling of IP datagrams MPLS: –LSPs can provide data link connections between remote networks –Builds on isolation of LSPs in the MPLS networkConsists of security headers and a set of protocols SSH/PPP: –Secure Shell (SSH) is a provides secure access to remote hosts. –Assumes client/server relationship –Intended as a replacement for insecure protocols such as Telnet, rsh, etc. –VPN services can be built by creating a PPP connection within a SSH connection