VPN. CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN.

Slides:



Advertisements
Similar presentations
Authenticating Users. Objectives Explain why authentication is a critical aspect of network security Explain why firewalls authenticate and how they identify.
Advertisements

Computer networks Fundamentals of Information Technology Session 6.
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
Key Provisioning Use Cases and Requirements 67 th IETF KeyProv BOF – San Diego Mingliang Pei 11/09/2006.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Rendezvous – a DIY VPN (profiting from mobile access to the enterprise) Rendezvous Server ET bjecvalu O.
INTRANET SECURITY Catherine Alexis CMPT 585 Computer and Data Security Dr Stefan Robila.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
Virtual Private Networking Karlene R. Samuels COSC513.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Remote Networking Architectures
Copyright Kenneth M. Chipps Ph.D. 1 VPN Last Update
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
Virtual Private Network
CACI Remote Access CACI has a range of remote access tools for offsite employees who need to connect to resources inside the CACI private network
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Dr. John P. Abraham Professor UTPA.  Particularly attacks university computers  Primarily originating from Korea, China, India, Japan, Iran and Taiwan.
Virtual Private Networks Alberto Pace. IT/IS Technical Meeting – January 2002 What is a VPN ? u A technology that allows to send confidential data securely.
1 Networks, advantages & types of What is a network? Two or more computers that are interconnected so they can exchange data, information & resources.
RSA Security Validating Users and Devices to Protect Network Assets Endpoint Solutions for Cisco Environments.
Access and Identity Management System (AIMS) Federal Student Aid PESC Fall 2009 Data Summit October 20, 2009 Balu Balasubramanyam.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
COMP 6005 An Introduction To Computing Session Four: Internetworking and the World Wide Web.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
© NeoAccel, Inc. TWO FACTOR AUTHENTICATION Corporate Presentation.
Corporate Information Systems Delivery of Infrastructure IT Services.
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Authenticating Users Chapter 6. Learning Objectives Understand why authentication is a critical aspect of network security Describe why firewalls authenticate.
Internet Security for Small & Medium Business Week 6
70-411: Administering Windows Server 2012
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Networks QUME 185 Introduction to Computer Applications.
©2010 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Network Access Technology: Secure Remote Access S Prasanna Bhaskaran.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
INTRODUCTION. The security system is used as in various fields, particularly the internet, communications data storage, identification and authentication.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Overview of Microsoft ISA Server. Introducing ISA Server New Product—Proxy Server In 1996, Netscape had begun to sell a web proxy product, which optimized.
Module 9: Fundamentals of Securing Network Communication.
2  Supervisor : MENG Sreymom  SNA 2012_Group4  Group Member  CHAN SaratYUN Sinot  PRING SithaPOV Sopheap  CHUT MattaTHAN Vibol  LON SichoeumBEN.
CERN - European Organization for Nuclear Research Beyond ACB – VPN’s FOCUS June 13 th, 2002 Frédéric Hemmer & Denise Heagerty- IT Division.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Web Server.
Chapter 40 Network Security (Access Control, Encryption, Firewalls)
Understand Network Isolation Part 2 LESSON 3.3_B Security Fundamentals.
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
SSH. 2 SSH – Secure Shell SSH is a cryptographic protocol – Implemented in software originally for remote login applications – One most popular software.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
Joe Knight’s Company VPN Policy. What is VPN? Virtual Private Network (VPN) will allow you all as users to remote into the network from home or anywhere.
Virtual Private Networks
Munix Bus WiFi Authentication, Log Management, Internet Security, Content Filter & VPN Service Internet Gateway & Business Intelligence
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data.
Barracuda SSL VPN Remote, Authenticated Access to Applications and Data Version 2.6 | July 2014.
Virtual Private Networks
Microsoft Windows NT 4.0 Authentication Protocols
Virtual Private Networks (VPN)
Unit 27: Network Operating Systems
VPN What, where, who, why when?.
Operating Systems Security
Topic 12: Virtual Private Networks
Presentation transcript:

VPN

CONFIDENTIAL Agenda Introduction Types of VPN What are VPN Tokens Types of VPN Tokens RSA How tokens Work How does a user login to VPN using VPN client

CONFIDENTIAL Introduction VPN – Virtual Private Network A virtual private network (VPN) extends a private network across a public network, such as the Internet. It enables a computer or network-enabled device to send and receive data across shared or public networks as if it were directly connected to the private network, while benefiting from the functionality, security and management policies of the private network

CONFIDENTIAL Activity

CONFIDENTIAL Types of VPN VPN can be classified into 2 types: Remote access Site to Site Mostly use VPN client on PC Use to access one or more application (mail / Intranet) User based access Will use secondary authentication (Tokens) Mostly use Hardware firewall / Router to create a VPN. Established between 2 office or locations over internet. Authentication could be stored in devices or use certificates.

CONFIDENTIAL Tokens and there Types A VPN token is a type of security mechanism that is used to authenticate a user or device on a VPN infrastructure. A VPN token works similarly to a standard security token. It primarily provides an additional layer of authentication and security within a VPN. A VPN token is typically enabled by two-factor authentication, where the end user not only provides a password but also authenticates the device. This is done to ensure that the user connects with a VPN only through an authorized device. A VPN token can be hardware or software based, however, most VPNs use software tokens to authorize remotely connected users. Hard Tokens Soft Tokens

CONFIDENTIAL RSA RSA SecurID provides world-leading two-factor authentication, protecting 25,000 organizations and 55 million users. RSA SecurID extends security to bring your own device (BYOD), cloud, and mobile as well as traditional virtual private network (VPN) and web portals. The RSA SecurID authentication mechanism consists of a "token" — either hardware (e.g. a USB dongle) or software (a soft token) — which is assigned to a computer user and which generates an authentication code at fixed intervals (usually 60 seconds) using a built-in clock and the card's factory-encoded random key (known as the "seed"). The seed is different for each token, and is loaded into the corresponding RSA SecurID server (RSA Authentication Manager, formerly ACE/Server) as the tokens are purchased. On-Demand tokens are also available, which provide a token code via or SMS delivery, eliminating the need to provision a token to the user.

CONFIDENTIAL How Tokens Work RSA SecurID architecture has three components: the RSA Authentication Manager, Agents, and Authenticators (tokens). Using the example above, Windows would act as an agent of RSA. When John logged in, Windows would read the login and transmit it to the RSA Authentication Manager. The RSA Authentication Manager will evaluate the authentication request, looking up John’s username to see his associated tokens, then check to see if the token code is the same as it calculates internally, and ensuring the PIN is correct. If any of these three pieces of information is wrong (username, token code, PIN), the authentication attempt will be rejected. If everything is correct, the Authentication Manager will send a message to the agent (Windows) that the authentication is successful. The RSA manager holds master timing information and shared secrets (seeds) between itself and the token. Tokens usually change every 60 seconds.

CONFIDENTIAL How to login via VPN Client Brower Based Client Application Based

CONFIDENTIAL Thank You