Authentication and Access Control Chapter 13 Networking Essentials Spring, 2013.

Slides:



Advertisements
Similar presentations
Network Security.
Advertisements

1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
1 Pertemuan 12 Authentication, Encryption, Digital Payments, and Digital Money Matakuliah: M0284/Teknologi & Infrastruktur E-Business Tahun: 2005 Versi:
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Guide to Network Defense and Countermeasures Second Edition
CN1260 Client Operating System Kemtis Kunanuraksapong MSIS with Distinction MCT, MCITP, MCTS, MCDST, MCP, A+
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
Chapter 10 Virtual Private Networks. VPN Defined  A segment of the public network made to appear part of a private network so that it can be used to.
Remote Networking Architectures
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
NetComm Wireless VPN Functionality Feature Spotlight.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Remote Access Chicca Kusumawardani Spring Introduction Company using a remote access Is it a good idea giving employees remote access? Is it expensive.
VPN Wireless Security at Penn State Rich Cropp Senior Systems Engineer Information Technology Services The Pennsylvania State University © All rights.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Network Security. An Introduction to Cryptography The encryption model (for a symmetric-key cipher).
Chapter 4 Windows NT/2000 Overview. NT Concepts  Domains –A group of one or more NT machines that share an authentication database (SAM) –Single sign-on.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
OpenVPN OpenVPN: an open source, cross platform client/server, PKI based VPN.
This courseware is copyrighted © 2011 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Secure Socket Layer (SSL)
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
11 SECURING COMMUNICATIONS Chapter 7. Chapter 7: SECURING COMMUNICATIONS2 CHAPTER OBJECTIVES  Explain how to secure remote connections.  Describe how.
1 Chapter 8 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Chapter 8 Panko, Corporate Computer and Network Security Copyright 2004 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Module 5: Configuring Access for Remote Clients and Networks.
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
Virtual Private Network(VPN) Presented By Aparna Chilukuri.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Potential vulnerabilities of IPsec-based VPN
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
Virtual Private Network Chapter 4. Lecturer : Trần Thị Ngọc Hoa2 Objectives  VPN Overview  Tunneling Protocol  Deployment models  Lab Demo.
Virtual Private Network (VPN)
Virtual Private Networks Manraj Sekhon. What is a VPN?
Invitation to Computer Science 5 th Edition Chapter 8 Information Security.
 authenticated transmission  secure tunnel over insecure public channel  host to host transmission is typical  service independent WHAT IS NEEDED?
INFORMATION SECURITY MANAGEMENT P ROTECTION M ECHANISMS - C RYPTOGRAPHY.
This courseware is copyrighted © 2016 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
Click to edit Master subtitle style Chapter 13: Authentication and Access Control.
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
VPN’s Andrew Stormer COSC 356 Fall What is a VPN? Acronym – Virtual Private Network Acronym – Virtual Private Network Connects two or more private.
IPSec Detailed Description and VPN
Virtual Private Network (VPN)
Virtual Private Network (VPN)
Virtual Private Network
Microsoft Windows NT 4.0 Authentication Protocols
Remote Access Lecture 2.
VPN: Virtual Private Network
Virtual Private Networks (VPN)
Virtual Private Network (VPN)
Security Protocols in the Internet
VPN: Virtual Private Network
Cengage Learning: Computer Networking from LANs to WANs
Virtual Private Networks (VPN)
Presentation transcript:

Authentication and Access Control Chapter 13 Networking Essentials Spring, 2013

Security Filtering Access Control Lists (ACLs) Primary weapon of a _______ Determines which _____ are allowed in and which _____ can be used Four conditions on page 427 – why?

Security Filtering Tunneling – used when you want to… Examples of tunneling protocols (p. 428)

Virtual Private Network (VPN) Remote access VPN (hint on p. 429 – top) Site-to-site VPN – like LT (SC – NC) Extranet VPN - why would you do this?

SSL Developed by _________ ______ Layer of the OSI Model Public key encryption HTTPS uses SSL to encrypt data (padlock) Evolved with other protocols to become ________, a Transport Layer protocol

L2TP Stands for _________________________ Developed by ______ Because it’s at Layer 2, it is not bound by IP and can be used with _____ and ______.

PPTP Stands for __________________________ Occurs at the _______ Layer of the OSI Model Not popular any more because… Read Note on bottom of 430

IPSec Developed specifically by ____ for _____ Works at the ______ Layer of OSI Model Note on page 431 Transport mode – encrypts ____ Tunnel mode – encrypts ______

Encryption Private Encryption Keys (symmetric) Sender and receiver use same key to encrypt/decrypt data DES the first well-known standard (____ bit) 3DES (more secure - _____ bits) AES (____, _____, or _____ bits) Public Key Encryption How does it work?

Other Algorithms RSA – used by ________ PGP - problem with government

Remote Access Technologies RAS – developed by _______ RDP – been there, done that (128 bit) PPP – _____ commonly use them for authentication PPPoE – encapsulating PPP frames within Ethernet frames VNC – platform independent, but not secure ICA – WinFrame, which is cool, but slow

Network Resource-Sharing Security Models Share Level You assign passwords to files and other resources (i.e. – printers) All resources visible, but not accessible (why is this a problem?) User Level You assign users rights to files and resources Only they can see, access resources

Managing Accounts When an employee leaves an organization Leave the account alone Delete the account Disable the account Which is best? Anonymous accounts Sometimes you need ‘em – why? Warning on bottom of 441

Limiting Connections for a User Why is this a bad idea? Why is this a good idea? Renaming the Administrator account – why?

Managing Passwords Minimum Length (at least ____, but less than _____) What NOT to choose as a password… Use of special characters

Password Management Features Automatic lockouts – why? Password expiration – why? How often? Password history – how many? Password change – how often?

User Authentication Methods PKI – CA is used to verify user’s identity Kerberos created at ____ Issues tickets

Authentication, Authorization, and Accounting RADIUS Used often for _______ users Note on page 449 TACACS+ Different from RADIUS – how? NAC – used in wireless setting to authenticate __________

More User Authentication (link)link CHAP MS-CHAP MS-CHAP v2 EAP –used for _____ and ______ forms of authentication

‘saboudit