Chapter 09

  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Chapter 09 as PDF for free.

More details

  • Words: 1,176
  • Pages: 49
Setting Up a Virtual Private Network Chapter 9

Learning Objectives Understand the components and essential operations of virtual private networks (VPNs) Describe the different types of VPNs Create VPN setups such as mesh or hub-andspoke configurations Choose the right tunneling protocol for your VPN Enable secure remote access for individual users via a VPN Observe best practices for configuring and maintaining VPNs effectively

VPNs Goal: Provide a cost-effective and secure way to connect businesses to one another and remote workers to office networks Encapsulate and encrypt data being transmitted Use authentication to ensure that only approved users can access the VPN Provide a means of secure point-to-point communications over the public Internet

VPN Components and Operations Essential components that make up a VPN How VPNs enable data to be accessed securely Advantages and disadvantages of using VPNs compared to leased lines How VPNs extend network boundaries

Components within VPNS Hardware devices  

Can have two endpoints or terminators Can have a (virtual) tunnel

Software that performs security-related activities

Devices That Form the Endpoints of the VPN Server running on a tunneling protocol VPN appliance A firewall/VPN combination A router-based VPN

Essential Activities of VPNs IP encapsulation Data payload encryption Encrypted authentication

IP Encapsulation Provides a high degree of protection VPN encapsulates actual data packets within packets that use source and destination addresses of VPN gateway 

Source and destination information of actual data packets are completely hidden

Because a VPN tunnel is used, source and destination IP addresses of actual data packets can be in private reserved blocks not usually routable over the Internet

Data Payload Encryption Transport method Tunnel method

Encrypted Authentication Hosts are authenticated by exchanging long blocks of code (keys) that are generated by complex formulas (algorithms) Types of keys that can be exchanged  

Symmetric keys Asymmetric keys

Advantages and Disadvantages of VPNs

VPNs Extend a Network’s Boundaries To deal with the increased risk caused by VPN connections 

 

Use two or more authentication tools to identify remote users Integrate virus protection Set usage limits

Types of VPNs Site-to-site VPN 

Links two or more networks

Client-to-site VPN 

Makes a network accessible to remote users who need dial-in access

VPN Appliances Hardware devices specially designed to terminate VPNs and join multiple LANs Permit connections, but do not provide other services (eg, file sharing, printing) Enable connections of more tunnels and users than software systems Examples  

SonicWALL series Symantec Firewall/VPN appliance

Advantage of Using Hardware Systems

Software VPN Systems Generally less expensive than hardware systems Tend to scale better for fast-growing networks Examples   

F-Secure VPN+ Novell BorderManager VPN services Check Point FireWall-1

VPN Combinations of Hardware and Software Cisco 3000 Series VPN Concentrator 

Gives users the choice of operating in:  Client mode, or  Network extension mode

VPN Combinations of Different Vendors’ Products Challenge: Get all pieces to talk to and communicate with one another successfully Pick a standard security protocol that is widely used and that all devices support (eg, IPSec)

VPN Setups If two participants 

Configuration is relatively straightforward in terms of expense, technical difficulty, and time

If three or more, several options   

Mesh configuration Hub-and-spoke arrangement Hybrid setup

Mesh Configuration Connects multiple computers that each have a security association (SA) with all other machines in the VPN

Hub-and-Spoke Configuration A single VPN router maintains records of all SAs Any device that wishes to participate in the VPN need only connect to the central router Easy to increase size of the VPN The requirement that all communications flow into and out of the central router slows down communications

Hybrid Configuration Benefits from the strengths of each— scalability of hub-and-spoke option and speed of mesh option Use mesh for most important branches of the network and critical communications Use hub-and-spoke for overseas branches and for new new branch offices

Configurations and Extranet and Intranet Access Extranet 

Enable firewalls and anti-virus software for each remote user or business partner

Intranet  

Establish usage limits Set up anti-virus and firewall protection

Configurations and Extranet and Intranet Access

Tunneling Protocols Used with VPNs IPSec/IKE PPTP (Point-to-Point Tunneling Protocol) L2TP (Layer 2 Tunneling Protocol) PPP over SSL (Point-to-Point Protocol over Secure Sockets Layer) PPP over SSH (Point-to-Point Protocol over Secure Shell)

IPSec/IKE IPSec provides:     

Encryption of the data part of packets Authentication Encapsulation between two VPN hosts Two security methods (AH and ESP) Capability to work in two modes (transport and tunnel)

IKE provides:  

Exchange of public and private keys Ability to determine which encryption protocols should be used to encrypt data that flows through VPN tunnel

PPTP Developed by Microsoft for granting VPN access to remote users over dial-up connections Uses Microsoft Point-to-Point Encryption (MPPE) to encrypt data Useful if support for older clients is needed Compatible with Network Address Translation (NAT) Replaced by L2TP

L2TP Extension to PPP that enables dial-up users to establish a VPN connection to a remote access server Uses IPSec to encrypt data Incompatible with NAT but provides a higher level of encryption and authentication

PPP Over SSL and PPP Over SSH Two UNIX based methods for creating VPNs Both combine existing tunnel system (PPP) with a way of encrypting data in transport (SSL or SSH) 

SSL  Public key encryption system used to provide secure

communications over the Web 

SSH  UNIX secure shell that uses secret key encryption (pre-shared

key) to authenticate participants

When to Use Different VPN Protocols

Enabling Remote Access Connections within VPNs Issue the user VPN client software Make sure user’s computer is equipped with anti-virus software and a firewall May need to obtain a key for the remote user if you plan to use IPSec to make VPN connection as well

Configuring the Server Major operating systems include ways of providing secure remote access 

Linux  IP Masquerade feature



Windows XP and 2000  Network Connections Wizard

Configuring the Server

Configuring the Server

Configuring Clients Involves either installing and configuring VPN client software or using the Network Connection Wizard Client workstation must be protected by a firewall

VPN Best Practices Security policy rules that specifically apply to the VPN Integration of firewall packet filtering with VPN traffic Auditing the VPN to make sure it is performing acceptably

The Need for a VPN Policy Identify who can use the VPN Ensure that all users know what constitutes proper use of the VPN   



Whether and how authentication is to be used Whether split tunneling is permitted How long users can be connected at any one session Whether virus protection is included

Packet Filtering and VPNs Encryption and decryption of data can be performed either outside the packet-filtering perimeter or inside it

PPTP Filter Rules

L2TP and IPSec Packet-Filtering Rules

Auditing and Testing the VPN Time consuming Choose client software that is easy for end users to install on their own to save you time and effort

Chapter Summary Configuration and operations of VPNs

Related Documents

Chapter 09
November 2019 10
Chapter 09
November 2019 16
Chapter 09
November 2019 9
Chapter 09
May 2020 4
Chapter 09
June 2020 1
Chapter 09
November 2019 7