setting up a virtual private network

49
Setting Up a Virtual Private Network Chapter 9

Upload: jarrod-eaton

Post on 30-Dec-2015

49 views

Category:

Documents


5 download

DESCRIPTION

Setting Up a Virtual Private Network. Chapter 9. Learning Objectives. Understand the components and essential operations of virtual private networks (VPNs) Describe the different types of VPNs Create VPN setups such as mesh or hub-and-spoke configurations - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: Setting Up a Virtual Private Network

Setting Up a Virtual Private Network

Chapter 9

Page 2: Setting Up a Virtual Private Network

Learning Objectives

Understand the components and essential operations of virtual private networks (VPNs)Describe the different types of VPNsCreate VPN setups such as mesh or hub-and-spoke configurationsChoose the right tunneling protocol for your VPNEnable secure remote access for individual users via a VPNObserve best practices for configuring and maintaining VPNs effectively

Page 3: Setting Up a Virtual Private Network

VPNs

Goal: Provide a cost-effective and secure way to connect businesses to one another and remote workers to office networks

Encapsulate and encrypt data being transmitted

Use authentication to ensure that only approved users can access the VPN

Provide a means of secure point-to-point communications over the public Internet

Page 4: Setting Up a Virtual Private Network

VPN Components and Operations

Essential components that make up a VPN

How VPNs enable data to be accessed securely

Advantages and disadvantages of using VPNs compared to leased lines

How VPNs extend network boundaries

Page 5: Setting Up a Virtual Private Network

Components within VPNS

Hardware devices Can have two endpoints or terminators Can have a (virtual) tunnel

Software that performs security-related activities

Page 6: Setting Up a Virtual Private Network
Page 7: Setting Up a Virtual Private Network
Page 8: Setting Up a Virtual Private Network
Page 9: Setting Up a Virtual Private Network

Devices That Form the Endpoints of the VPN

Server running on a tunneling protocol

VPN appliance

A firewall/VPN combination

A router-based VPN

Page 10: Setting Up a Virtual Private Network

Essential Activities of VPNs

IP encapsulation

Data payload encryption

Encrypted authentication

Page 11: Setting Up a Virtual Private Network

IP Encapsulation

Provides a high degree of protectionVPN encapsulates actual data packets within packets that use source and destination addresses of VPN gateway Source and destination information of actual data

packets are completely hidden

Because a VPN tunnel is used, source and destination IP addresses of actual data packets can be in private reserved blocks not usually routable over the Internet

Page 12: Setting Up a Virtual Private Network

Data Payload Encryption

Transport method

Tunnel method

Page 13: Setting Up a Virtual Private Network

Encrypted Authentication

Hosts are authenticated by exchanging long blocks of code (keys) that are generated by complex formulas (algorithms)

Types of keys that can be exchanged Symmetric keys Asymmetric keys

Page 14: Setting Up a Virtual Private Network

Advantages and Disadvantages of VPNs

Page 15: Setting Up a Virtual Private Network

VPNs Extend a Network’s Boundaries

To deal with the increased risk caused by VPN connections Use two or more authentication tools to identify

remote users Integrate virus protection Set usage limits

Page 16: Setting Up a Virtual Private Network

Types of VPNs

Site-to-site VPN Links two or more networks

Client-to-site VPN Makes a network accessible to remote users

who need dial-in access

Page 17: Setting Up a Virtual Private Network

VPN Appliances

Hardware devices specially designed to terminate VPNs and join multiple LANsPermit connections, but do not provide other services (eg, file sharing, printing)Enable connections of more tunnels and users than software systemsExamples SonicWALL series Symantec Firewall/VPN appliance

Page 18: Setting Up a Virtual Private Network

Advantage of Using Hardware Systems

Page 19: Setting Up a Virtual Private Network

Software VPN Systems

Generally less expensive than hardware systemsTend to scale better for fast-growing networksExamples F-Secure VPN+ Novell BorderManager VPN services Check Point FireWall-1

Page 20: Setting Up a Virtual Private Network

VPN Combinations of Hardware and Software

Cisco 3000 Series VPN Concentrator Gives users the choice of operating in:

Client mode, or Network extension mode

Page 21: Setting Up a Virtual Private Network

VPN Combinations of Different Vendors’ Products

Challenge: Get all pieces to talk to and communicate with one another successfully

Pick a standard security protocol that is widely used and that all devices support(eg, IPSec)

Page 22: Setting Up a Virtual Private Network

VPN Setups

If two participants Configuration is relatively straightforward in

terms of expense, technical difficulty, and time

If three or more, several options Mesh configuration Hub-and-spoke arrangement Hybrid setup

Page 23: Setting Up a Virtual Private Network

Mesh Configuration

Connects multiple computers that each have a security association (SA) with all other machines in the VPN

Page 24: Setting Up a Virtual Private Network
Page 25: Setting Up a Virtual Private Network

Hub-and-Spoke Configuration

A single VPN router maintains records of all SAsAny device that wishes to participate in the VPN need only connect to the central routerEasy to increase size of the VPNThe requirement that all communications flow into and out of the central router slows down communications

Page 26: Setting Up a Virtual Private Network
Page 27: Setting Up a Virtual Private Network

Hybrid Configuration

Benefits from the strengths of each—scalability of hub-and-spoke option and speed of mesh option

Use mesh for most important branches of the network and critical communications

Use hub-and-spoke for overseas branches and for new new branch offices

Page 28: Setting Up a Virtual Private Network

Configurations and Extranet and Intranet Access

Extranet Enable firewalls and anti-virus software for

each remote user or business partner

Intranet Establish usage limits Set up anti-virus and firewall protection

Page 29: Setting Up a Virtual Private Network

Configurations and Extranet and Intranet Access

Page 30: Setting Up a Virtual Private Network

Tunneling Protocols Used with VPNs

IPSec/IKE

PPTP (Point-to-Point Tunneling Protocol)

L2TP (Layer 2 Tunneling Protocol)

PPP over SSL (Point-to-Point Protocol over Secure Sockets Layer)

PPP over SSH (Point-to-Point Protocol over Secure Shell)

Page 31: Setting Up a Virtual Private Network

IPSec/IKE

IPSec provides: Encryption of the data part of packets Authentication Encapsulation between two VPN hosts Two security methods (AH and ESP) Capability to work in two modes (transport and tunnel)

IKE provides: Exchange of public and private keys Ability to determine which encryption protocols should

be used to encrypt data that flows through VPN tunnel

Page 32: Setting Up a Virtual Private Network

PPTP

Developed by Microsoft for granting VPN access to remote users over dial-up connections

Uses Microsoft Point-to-Point Encryption (MPPE) to encrypt data

Useful if support for older clients is needed

Compatible with Network Address Translation (NAT)

Replaced by L2TP

Page 33: Setting Up a Virtual Private Network

L2TP

Extension to PPP that enables dial-up users to establish a VPN connection to a remote access server

Uses IPSec to encrypt data

Incompatible with NAT but provides a higher level of encryption and authentication

Page 34: Setting Up a Virtual Private Network

PPP Over SSL andPPP Over SSH

Two UNIX based methods for creating VPNs

Both combine existing tunnel system (PPP) with a way of encrypting data in transport (SSL or SSH) SSL

Public key encryption system used to provide secure communications over the Web

SSH UNIX secure shell that uses secret key encryption (pre-shared

key) to authenticate participants

Page 35: Setting Up a Virtual Private Network

When to Use Different VPN Protocols

Page 36: Setting Up a Virtual Private Network

Enabling Remote Access Connections within VPNs

Issue the user VPN client software

Make sure user’s computer is equipped with anti-virus software and a firewall

May need to obtain a key for the remote user if you plan to use IPSec to make VPN connection as well

Page 37: Setting Up a Virtual Private Network

Configuring the Server

Major operating systems include ways of providing secure remote access Linux

IP Masquerade feature Windows XP and 2000

Network Connections Wizard

Page 38: Setting Up a Virtual Private Network

Configuring the Server

Page 39: Setting Up a Virtual Private Network

Configuring the Server

Page 40: Setting Up a Virtual Private Network

Configuring Clients

Involves either installing and configuring VPN client software or using the Network Connection Wizard

Client workstation must be protected by a firewall

Page 41: Setting Up a Virtual Private Network

VPN Best Practices

Security policy rules that specifically apply to the VPN

Integration of firewall packet filtering with VPN traffic

Auditing the VPN to make sure it is performing acceptably

Page 42: Setting Up a Virtual Private Network

The Need for a VPN Policy

Identify who can use the VPNEnsure that all users know what constitutes proper use of the VPN Whether and how authentication is to be used Whether split tunneling is permitted How long users can be connected at any one

session Whether virus protection is included

Page 43: Setting Up a Virtual Private Network

Packet Filtering and VPNs

Encryption and decryption of data can be performed either outside the packet-filtering perimeter or inside it

Page 44: Setting Up a Virtual Private Network
Page 45: Setting Up a Virtual Private Network
Page 46: Setting Up a Virtual Private Network

PPTP Filter Rules

Page 47: Setting Up a Virtual Private Network

L2TP and IPSecPacket-Filtering Rules

Page 48: Setting Up a Virtual Private Network

Auditing and Testing the VPN

Time consuming

Choose client software that is easy for end users to install on their own to save you time and effort

Page 49: Setting Up a Virtual Private Network

Chapter Summary

Configuration and operations of VPNs