Presentation is loading. Please wait.

Presentation is loading. Please wait.

Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.

Similar presentations


Presentation on theme: "Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication."— Presentation transcript:

1 Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication

2 Topic A Topic A: Network access security methods Topic B: User authentication

3 Network Access Control Ensures that computers comply with security policies Network Access Protection (NAP) Overall NAC architecture

4 Access control lists MAC address filtering IP address and port filtering

5 VPN technologies Authentication Tunneling Encryption

6 VPN security models Authentication before connection Trusted delivery network Secure VPNs

7 VPN protocols PPTP L2TP IPSec SSL/TLS

8 PPTP vs. L2TP Encryption Authentication Data protocols Port

9 IPSec protocols Authentication Header (AH) Encapsulating Security Payload (ESP) IP Payload Compression Protocol (IPComp) Internet Key Exchange (IKE)

10 IPSec encryption Transport mode Tunnel mode

11 PPPoE Encapsulates PPP inside Ethernet frames Allows users to establish a secure connection from one computer to another Used to connect multiple users to the Internet through DSL and cable modem connections

12 Remote desktop services RDP (Remote Desktop Protocol) ICA (Independent Computing Architecture)

13 SSH Remote command-line access Server service and client program Native to Linux distributions SSH-2 –Transport layer –User Authentication layer –Connection layer

14 Activity A-1 Discussing network access security methods

15 Topic B Topic A: Network access security methods Topic B: User authentication

16 AAA Authentication Authorization Accounting

17 Authentication factors Something you know Something you have Something you are

18 One-factor authentication Something you know OR something you have OR something you are

19 Two-factor authentication Something you know PLUS –Something you have OR something you are

20 Three-factor authentication Something you know + something you have + something you are

21 Single sign-on User is authenticated to other resources based on strength of initial sign-on SSL, LDAP Windows Live ID, Microsoft Passport, Open ID

22 Kerberos Current version is 5 Provides authentication on physically insecure networks Freely available in U.S. and Canada Authenticates users over open multi- platform network using single login

23 Kerberos system components Principal Authentication server Ticket-granting server Key distribution center Realm Remote ticket-granting server

24 Kerberos data types Credentials Session key Authentication Ticket Ticket-granting ticket

25 Kerberos authentication process

26 CHAP

27 EAP PPP extension Used in wireless connections Can use token cards, one-time passwords, certificates, biometrics Runs over Data Link layers Defines formats –LEAP –EAP-TLS –EAP-FAST

28 PPPoE PPP encapsulated inside Ethernet frames Connects multiple uses to Internet

29 Mutual authentication Client and server authenticate to each other Also known as two-way authentication Trust other computer’s digital certificate Can block rogue services

30 Cryptography Science of encryption Encryption = convert to unreadable format Decryption = convert back to readable format Algorithm = procedure for encrypting or decrypting Cipher = encryption & decryption algorithm pair

31 ROT13 cipher

32 Keys Secret information used by cipher Symmetric = same key for encryption and decryption Asymmetric = differing keys for encryption and decryption Key sharing and management issues

33 Symmetric encryption in action

34 Public key cryptography Asymmetric Two keys –What one encrypts, only the other can decrypt –One kept private –One shared (public) Encryption process Keys mathematically related

35 Asymmetric encryption in action

36 Public key cryptography Mathematically difficult to derive private key from public key Data encrypted with public key can be decrypted with only private key Data encrypted with private key can be decrypted with only public key

37 Public key infrastructure Certificate authority (CA) Registration authority (RA) Certificate server

38 Setup and initialization phase Process components –Registration –Key pair generation –Certificate generation –Certificate dissemination

39 RADIUS Remote Authentication Dial-in User Service Client = network access server or device (e.g., wireless router) Server = AAA service provider

40 RADIUS authentication 1.User connects to NAS 2.RADIUS client requests authentication from server 3.User supplies logon credentials 4.Client encrypts and forwards to server 5.Server authenticates, returns message 6.Client receives message and acts –Accept –Reject –Challenge

41 TACACS+ Terminal Access Controller Access Control System –TACACS –XTACACS AAA functions

42 TACACS+ vs. RADIUS TCP rather than UDP Message body fully encrypted AAA services provided independently Flexible –Username/password, ARA, SLIP, PAP, CHAP, Telnet Multiprotocol –TCP/IP, AppleTalk, NetBIOS Novell Asyc Services Interface, X.25

43 802.1x Authentication protocol Device access control Works with RADIUS and TACACS+ Device roles –Supplicant (end-user device) –Authenticator –Authentication server

44 Activity B-1 Discussing methods of authenticating users

45 Unit summary Explained the methods of ensuring network access security Explained methods of user authentication


Download ppt "Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication."

Similar presentations


Ads by Google