Private Network Interconnection Chapter 20. Introduction Privacy in an internet is a major concern –Contents of datagrams that travel across the Internet.

Slides:



Advertisements
Similar presentations
1 Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT.
Advertisements

CST Computer Networks NAT CST 415 4/10/2017 CST Computer Networks.
CPSC Network Layer4-1 IP addresses: how to get one? Q: How does a host get IP address? r hard-coded by system admin in a file m Windows: control-panel->network->configuration-
PRIVATE NETWORK INTERCONNECTION (NAT AND VPN) & IPv6
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 25 Introduction to Computer Networks.
IST 201 Chapter 9. TCP/IP Model Application Transport Internet Network Access.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
CSCI 4550/8556 Computer Networks Comer, Chapter 23: An Error Reporting Mechanism (ICMP)
Week 5: Internet Protocol Continue to discuss Ethernet and ARP –MTU –Ethernet and ARP packet format IP: Internet Protocol –Datagram format –IPv4 addressing.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
COS 420 Day 18. Agenda Assignment 4 Posted Chap Due April 6 Group project program requirements Submitted but Needs lots of work Individual Project.
Chapter 5 The Network Layer.
1 Network Address Translation (NAT) Relates to Lab 7. Module about private networks and NAT.
COS 420 Day 20. Agenda Group Project Discussion Protocol Definition Due April 12 Paperwork Due April 29 Assignment 3 Due Assignment 4 is posted Last Assignment.
Nelson Azadian Victor Seletskiy Pavel Dikhtyar
Understanding Networks. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Chapter 6 Network Address Translation (NAT). Network Address Translation  Modification of source or destination IP address  Needed by networks using.
Subnetting.
Chapter 2 Internet Protocol DoD Model Four layers: – Process/Application layer – Host-to-Host layer – Internet layer – Network Access layer.
TCP/IP Protocol Suite 1 Chapter 26 Upon completion you will be able to: Virtual Private Networks and Network Address Translation Understand the difference.
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Support Protocols and Technologies. Topics Filling in the gaps we need to make for IP forwarding work in practice – Getting IP addresses (DHCP) – Mapping.
4: Addressing Working At A Small-to-Medium Business or ISP.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Addressing the Network – IPv4 Network Fundamentals – Chapter 6.
Network Layer4-1 NAT: Network Address Translation local network (e.g., home network) /24 rest of.
DHCP: Dynamic Host Configuration Protocol
23-Support Protocols and Technologies Dr. John P. Abraham Professor UTPA.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
9/11/2015Home Networking1 Bob.test Have Road Runner Unhappy about reports of constant probes of machines Policy decision –I want to prevent unauthorized.
1 IP: putting it all together Part 2 G53ACC Chris Greenhalgh.
Objectives Configure routing in Windows Server 2008 Configure Network Address Translation 1.
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
© MMII JW RyderCS 428 Computer Networking1 Private Network Interconnection  VPN - Virtual Private Networks  NAT - Network Address Translation  Describe.
Page 1 NAT & VPN Lecture 8 Hassan Shuja 05/02/2006.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Mobile IP Chapter 19. Introduction Mobile IP is designed to allow portable computers to move from one network to another Associated with wireless technologies.
Objectives: Chapter 5: Network/Internet Layer  How Networks are connected Network/Internet Layer Routed Protocols Routing Protocols Autonomous Systems.
Transport Layer 3-1 Chapter 4 Network Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012  CPSC.
Network Layer4-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
1 Chapter 7: NAT in Internet and Intranet Designs Designs That Include NAT Essential NAT Design Concepts Data Protection in NAT Designs NAT Design Optimization.
1 實驗九:建置網路安全閘道器 教師: 助教:. 2 Outline  Background  Proxy – Squid  Firewall – IPTables  VPN – OpenVPN  Experiment  Internet gateway  Firewall  VPN.
TCP/IP Protocols Contains Five Layers
Lectu re 1 Recap: “Operational” view of Internet r Internet: “network of networks” m Requires sending, receiving of messages r protocols control sending,
Chapter 23 Internet Control Message Protocol used to report information and errors IP uses ICMP when it sends an error message ICMP uses IP to transport.
Transport Layer3-1 Chapter 4: Network Layer r 4. 1 Introduction r 4.2 Virtual circuit and datagram networks r 4.3 What’s inside a router r 4.4 IP: Internet.
1 Network Address Translation (NAT) and Dynamic Host Configuration Protocol (DHCP) Relates to Lab 7. Module about private networks and NAT.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
Data Communications and Computer Networks Chapter 4 CS 3830 Lecture 19 Omar Meqdadi Department of Computer Science and Software Engineering University.
1 Network Address Translation. 2 Network Address Translation (NAT) Extension of original addressing scheme Motivated by exhaustion of IP address space.
Routing. Classless Inter-Domain Routing Classful addressing scheme wasteful – IP address space exhaustion – A class B net allocated enough for 65K hosts.
Final Examination of Internet Communication Protocol.
Virtual Private Network (VPN) 1. A corporation with multiple geographic sites can use one of two approaches to building a corporate intranet. – Private.
Network Layer IP Address.
Virtual Private Networks,
Network Address Translation (NAT)
Internet Control Message Protocol
Network Address Translation (NAT)
NET323 D: Network Protocols
NAT/ARP/RARP (Ch 5 & 8) Dr. Clincy Lecture.
8PM – Quickly Overview Final Project
NET323 D: Network Protocols
Firewalls Routers, Switches, Hubs VPNs
Virtual Private Networks and Network Address Translation
Virtual Private Networks and Network Address Translation
COMPUTER NETWORKS CS610 Lecture-35 Hammad Khalid Khan.
CS4470 Computer Networking Protocols
COMPUTER NETWORKS CS610 Lecture-38 Hammad Khalid Khan.
Network Address Translation (NAT)
Presentation transcript:

Private Network Interconnection Chapter 20

Introduction Privacy in an internet is a major concern –Contents of datagrams that travel across the Internet may be viewed as they pass across networks owned by other organizations Internal datagrams are those sent between computers within an organization External datagrams are those sent between computers in different organizations –The goal is to keep internal datagrams private, while allowing external communication

Private and Hybrid Networks Private Networks –Use routers to connect networks at each site, and leased digital circuits to interconnect the sites –Can use arbitrary IP addresses –Are isolated from the Internet Hybrid Networks –Use valid IP addresses, and sites are connected to the Internet –Assured of privacy when communicating internally –See the leased circuit and connections to the Internet in Figure 20.1 Both are expensive, may lease T1 lines

Virtual Private Networks A VPN uses the Internet to connect sites Communication between computers in the VPN is concealed from outsiders –tunneling using IP-in-IP encapsulation –datagrams are encrypted before they are encapsulated outsiders cannot decrypt because they do not have an encryption key

VPN Addressing and Routing A VPN routes data through a tunnel –See routing table for R 1 which handles tunneling in Figure 20.3 –Example A computer on network sends a datagram to a computer on network The datagram is forwarded to R 2 which forwards it to R 1 R 1 encrypts the datagram, encapsulates it in the data portion of an outer datagram with destination R 3, and forwards the outer datagram through the local ISP and across the Internet R 3 recognizes the datagram as tunneled from R 1 R 3 decrypts the data area and forwards it to R 4 for delivery

A VPN with Private Addresses A VPN offers the same addressing options as a private network –If Internet connectivity is not used, arbitrary IPs can be assigned –If Internet connectivity is used, a hybrid addressing scheme can be used –But when private addressing is used, one valid IP address is needed at each site for tunneling In Figure 20.4, site 1 uses subnet /16 and site 2 uses subnet /16 Two valid IP addresses are required for connection to Internet

A VPN with Private Addresses How can a site provide access to the Internet without assigning each host a valid IP address? –Using an application gateway - each site has a multi- homed host connected to the Internet (IP address) and to the private network (private IP address) This host runs a set of application programs that each handle one service Other hosts at the site send requests to the application gateway which interacts with the Internet

Network Address Translation (NAT) Requires a site to have a single connection to the Internet and at least one valid IP address, G –Address G is assigned to a multi-homed computer that connects to the Internet and runs NAT software called a NAT box all datagrams pass through on the way to/from the Internet –NAT translates the addresses in the datagrams by replacing the outgoing source address with G replacing the incoming destination address with its private address

NAT Translation Table Creation How does NAT know the destination for an incoming datagram? –NAT maintains a translation table holding the IP address of a host on the Internet and the internal IP address of a host at the site How is the table initialized? –Manually –Outgoing datagrams - set when datagram is sent –Incoming name lookups - set when domain names are requested

NAT Translation Table Creation Figure 20.5 shows an ISP that serves dial-up customers –The ISP assigns an IP address to a custome when the customer dials in –NAT allows the ISP to assign private addresses , then , etc. –When a customer sends a datagram to a destination on the Internet, NAT uses the outoging datagram to initialize its translation table

Multi-Address NAT The NAT box can be allowed to hold mutiple Internet addresses –Previously we only allowed a 1-to-1 address mapping At most one computer at the site has access to a given machine on the Internet at any time –This variation is multi-address NAT A NAT box has a set of K valid addresses G 1, G 2, … G k When the first host accesses a destination, G 1 is assigned If another host accesses the same destination, G 2 is assigned… Thus, up to k internal hosts may access a destination at the same time

Port-Mapped NAT This variation of NAT translates TCP or UDP port numbers as well as addresses (NAPT) –The table contains the source and destination IP addresses and the source and destination protocol ports –The tables also indicates a port number used by the NAT box as shown in Figure 20.6

Interaction Between NAT and ICMP NAT must handle ICMP Example –When ping is used, ICMP sends an echo request and an echo reply –NAT does not forward all ICMP messages from the Internet NAT determines whether the message is to be handled locally or sent to an internal host Before forwarding, NAT translates the ICMP message –ICMP’s destination unreachable is an example

Interaction Between NAT and Applications NAT does not work with applications that send IP addresses or protocol ports as data –unless NAT is programmed to recognize the application (like FTP) and make changes in the data –most implementations of NAT only recognize a few standard services

Slirp and Masquerade Two implementations of NAT came from UNIX –slirp A computer with a provate address dials in The computer starts PPP and gets access to the Internet –masquerade Can be configured to operate like a router between two networks

Summary A VPN allows an organization to use the Internet to connect to multiple sites It uses encryption to guarantee privacy A VPN can be isolated or hybrid To communicate between hosts in different address domains –application gateways act like proxy receiving requests from a host in one domain to another in a different domain –NAT provides access to the Internet from a host with a private address

For Next Time Read Chapter 21