Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Internet Protocol Security (IP Sec)
Guide to Network Defense and Countermeasures Second Edition
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
SCSC 455 Computer Security Virtual Private Network (VPN)
IPsec: Internet Protocol Security Chong, Luon, Prins, Trotter.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Chapter 5 Secure LAN Switching.  MAC Address Flooding Causing CAM Overflow and Subsequent DOS and Traffic Analysis Attacks.
Internet Security Seminar Class CS591 Presentation Topic: VPN.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Internet Protocol Security (IPSec)
Remote Networking Architectures
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
Overview of Routing and Remote Access Service (RRAS) When RRAS was implemented in Microsoft Windows NT 4.0, it added support for a number of features.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Virtual Private Network
Chapter 11: Dial-Up Connectivity in Remote Access Designs
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Network Services Lesson 6. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Setting up common networking services Understanding.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
Virtual Private Networks Alberto Pace. IT/IS Technical Meeting – January 2002 What is a VPN ? u A technology that allows to send confidential data securely.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
WAN Technologies Dial-up modem connections
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
11 SECURING COMMUNICATIONS Chapter 7. Chapter 7: SECURING COMMUNICATIONS2 CHAPTER OBJECTIVES  Explain how to secure remote connections.  Describe how.
Remote Access Chapter 4. IEEE 802.1x An internet standard created to perform authentication services for remote access to a central LAN. An internet standard.
Chapter 7 Low-Level Protocols
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
Chapter Three Network Protocols By JD McGuire ARP Address Resolution Protocol Address Resolution Protocol The core protocol in the TCP/IP suite that.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Tunneling and Securing TCP Services Nathan Green.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Module 4 Quiz. 1. Which of the following statements about Network Address Translation (NAT) are true? Each correct answer represents a complete solution.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
K. Salah1 Security Protocols in the Internet IPSec.
KAPLAN SCHOOL OF INFORMATION SYSTEMS AND TECHNOLOGY IT375 Window Enterprise Administration Course Name – IT Introduction to Network Security Instructor.
Secure Communications ● Cleartext vs. encryption and encapsulation ● Protocols not to use ● SSH – scp/ftp – SSH tunnelling ● VPN.
Virtual Private Networks
IPSec Detailed Description and VPN
Virtual Private Networks
Remote Access Lecture 2.
Goals Introduce the Windows Server 2003 family of operating systems
Cengage Learning: Computer Networking from LANs to WANs
Virtual Private Networks (VPN)
Presentation transcript:

Remote Access Chapter 4

Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing remote access to networks Understand how RADIUS authentication works Understand how TACACS+ operates Understand how PPTP works and when it is used continued…

Learning Objectives Understand how SSH operates and when it is used Understand how IPSec works and when it is used Understand the vulnerabilities associated with telecommuting

IEEE 802.1x Internet standard created to perform authentication services for remote access to a central LAN Uses SNMP to define levels of access control and behavior of ports providing remote access to LAN environment Uses EAP over LAN (EAPOL) encapsulation method

802.1x General Topology

Telnet Standard terminal emulation protocol within TCP/IP protocol suite defined by RFC 854 Utilizes UDP port 23 to communicate Allows users to log on to remote networks and use resources as if locally connected

Controlling Telnet Assign enable password as initial line of defense Use access lists that define who has access to what resources based on specific IP addresses Use a firewall that can filter traffic based on ports, IP addresses, etc

Virtual Private Network Secures connection between user and home office using authentication mechanisms and encryption techniques  Encrypts data at both ends Uses two technologies  IPSec  PPTP

VPN Diagram

Tunneling Enables one network to send its data via another network’s connections Encapsulates a network protocol within packets carried by the second network

Tunneling

VPN Options Install/configure client computer to initiate necessary security communications Outsource VPN to a service provider  Encryption does not happen until data reaches provider’s network

Service Providing Tunneling

VPN Drawbacks Not completely fault tolerant Diverse implementation choices  Software solutions Tend to have trouble processing all the simultaneous connections on a large network  Hardware solutions Require higher costs

Remote Authentication Dial-in User Service (RADIUS) Provides a client/server security system Uses distributed security to authenticate users on a network Includes two pieces  Authentication server  Client protocols Authenticates users through a series of communications between client and server using UDP

Authenticating with a RADIUS Server

Benefits of Distributed Approach to Network Security Greater security: Centralized security entity Improved Scalability: Use can get access from any communications server Open protocols: Distributed in source code so customization is easy Future enhancements: New technologies can be added directly to the RADIUS server

Terminal Access Controller Access Control System (TACACS+) Authentication protocol developed by Cisco Uses TCP – a connection-oriented transmission – instead of UDP Offers separate acknowledgement that request has been received regardless of speed of authentication mechanism Provides immediate indication of a crashed server Encrypt all messages not only the password

Advantages of TACACS+ over RADIUS Addresses need for scalable solution Separates authentication, authorization, and accounting: Can be used with other systems Offers multiple protocol support. Such as NetBIOS, Novel Asynchronous Service Interface, etc.

Point-to-Point Tunneling Protocol Multiprotocol that offers authentication, methods of privacy, and data compression Built upon PPP and TCP/IP Achieves tunneling by providing encapsulation (wraps packets of information within IP packets)  Data packets  Control packets Provides users with virtual node on corporate LAN or WAN

PPTP Tasks Queries status of communications servers Allocates channels and places outgoing calls Notifies Windows NT Server of incoming calls Transmits and receives user data with bi- directional flow control Notifies Windows NT Server of disconnected calls Assures data integrity; coordinates packet flow

Quick Quiz 802.1x defines the different levels of access control and behavior of ports providing remote access to the LAN environment using_________ EAP is encapsulated in standard 801.x frames. (T/F) Telnet uses port _______ to communicate. VPN connections make use of special software installed on the client to make use of which two types of secure connection? An advantage of RADIUS over TACACS+ is that RADIUS offers multiple protocol support. (T/F)

Secure Shell (SSH) Secure replacement for remote logon and file transfer programs (Telnet and FTP) that transmit data in unencrypted text Uses public key authentication to establish an encrypted and secure connection from user’s machine to remote machine Used to:  Log on to another computer over a network  Execute command in a remote machine  Move files from one machine to another

Key Components of an SSH Product Engine: receives enrollment request from the GW and generates and signs certificates Administration server: HTTP server with TLS implementation Enrollment gateway Publishing server: performs publishing in the directory

IP Security Protocol Set of protocols developed by the IETF to support secure exchange of packets at IP layer Deployed widely to implement VPNs Works with existing and future IP standards Transparent to users Promises painless scalability Handles encryption at packet level using Encapsulating Security Payload (ESP)

IPSec Security Payload

ESP and Encryption Models Supports many encryption protocols Encryption support is designed for use by symmetric encryption algorithms Provides secure VPN tunneling. The ESP authentication field an Integrity Check Value (ICV) that is calculated after encrypting the packed using Hash Message Authentication Code (HMAC)

Telecommuting Vulnerabilities

Remote Solutions Microsoft Terminal Server Citrix Metaframe Virtual Network Computing

Chapter Summary Paramount need for remote access security Use of technologies to mitigate some of the risk of compromising the information security of a home network Importance of keeping pace with technology changes