VPN presentation - moeshesh

1,425 views

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,425
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
85
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

VPN presentation - moeshesh

  1. 1. :(Virtual Private Network (VPN VPN network provides the same secure site to site network connectivity for remote user over the internet.
  2. 2. ?Why Have VPNs
  3. 3. :VPN Tunnels and Encryption
  4. 4. :VPN Security algorithms
  5. 5. : Symmetric key Shared secret key is the same key is used by the sender (for encryption) and the receiver (for decryption). Shared secret key is often used for long messages.
  6. 6. (Data Encryption Standard (DES
  7. 7. One iteration
  8. 8. : Key Exchange—Diffie-Hellman
  9. 9. :(Authentication (pre-shared key
  10. 10. HashFunction :( (MD5,SHA-1is a formula used to convert a variable-length message into a single  .string of digits of a fixed length
  11. 11. : VPN protocols L2TP (layer 2 tunneling protocol): is used to create a media-independent , multiprotocol virtual private dialup network (VPDN)…….but it does not provide encryption. GRE(Generic routing encapsulation ) : with GRE tunneling cisco router at each site encapsulates protocol specific packets in IP HEADER creating point to point link to cisco router at other of an Ip cloud ,where the IP header is stripped off . IPsec( IP security protocol ): is the choice for secure corporate VPNs .it can provide the security service using internet key exchange (IKE) to handle negotation of protocols and algortithms based on local polivy and to generate the encryption and authentication key to be used by IPSec.
  12. 12. Internet Key Exchange (IKE): used to esablish ashared security policy and authentication keys for services such as IPSec that require keys . one of its protocols is ISAKMPInternet Security Association and Key Management Protocol (ISAKMP): it is protocol used for implementing akey exchange and negotation of security association (SA)
  13. 13. Security association (SA): It is the security database that contains all the security policy that the VPN will based on. This security database contains that:1-authentication ,encryption algorithm.2-specification of network traffic.3-IPsec protocols .4-IPsec modes .
  14. 14. :IPsec protocols Encapsulating Security Payload (ESP): a security protocol that provide data encryption and production with optional authentication …it can completely encapsulates user data Authentication Header (AH): a security protocol that provide authentication .it can be used either by itself or with ESP
  15. 15. :Tunnel versus Transport Mode
  16. 16. Tasks to Configure IPSec (site to(site Task 1 – Prepare for IKE and IPSEC Task 2 – Configure IKE Task 3 – Configure IPSec Task 4 – Test and Verify IPSEC
  17. 17. Step1- Determine IKE(IKE Phase 1( PolicyDetermine the following policy details: Key distribution method Authentication method IPSec peer IP addresses and hostnamesIKE phase 1 policies for all peers  Encryption algorithm  Hash algorithm  IKE SA lifetimeGoal : setup a secure commuication channel for negotiation of IPSec SA in phase2
  18. 18. Step2-Determine IPSec (IKE Phase 2( PolicyDetermine the following policy details: IPSec algorithms and parameters for optimal security and performance IPSec peer details IP address and applications of hosts to be protected IKE-initiated SasGoal : these are security parameters used to protect data and messages exchanged between end points
  19. 19. Step 3—Check Current Configuration
  20. 20. Step4- Ensure the Network Works
  21. 21. Step 1—Enable IKE
  22. 22. Step 2—Create IKE Policies
  23. 23. Step 3—Configure ISAKMP Identity
  24. 24. Step4- Verify IKE Configuration
  25. 25. Step1- Configure Transform Sets
  26. 26. Step2- IPSec Security Association Lifetimes
  27. 27. Step 3—Create Crypto ACLs using ExtendedAccess Lists
  28. 28. Purpose of Crypto MapsCrypto maps pull together the various parts configured for IPSec, including The traffic to be protected by IPSec and a set of SAs The local address to be used for the IPSec traffic The destination location of IPSec-protected traffic The IPSec type to be applied to this traffic
  29. 29. Step 4—Configure IPSec Crypto Maps & apply itto interfaces
  30. 30.  Display your configured IKE policies .show crypto isakmp policy Display your configured transform sets. show crypto ipsec transform set Display security associations show crypto isakmp sa Display the current state of your IPSec SAs. show crypto ipsec sa Display your configured crypto maps. show crypto map Enable debug output for IPSec events. debug crypto ipsec Enable debug output for ISAKMP events. debug crypto isakmp
  31. 31. :VPN Remote access The requirements for VPN Servers include the need for Internet Security Association and Key Management Protocol (ISAKMP) policies using Diffie-Hellman. The VPN Remote feature does support transform sets providing Both encryption and authentication ; so it does not support Authentication Header (AH) authentication.
  32. 32.  AAA (authentication, authorization and accounting) servers :are used for more secure access in a remote-access VPN environment.AAA then checks the following: Who you are (authentication) What you are allowed to do (authorization) What you actually do (accounting)The accounting information is especially useful for tracking client use for security auditing, billing or reporting purposes
  33. 33. : VPN Client The installation of the Cisco VPN Client is a very straightforward process. A number of tasks must be completed to establish connectivity to a VPN head-end. just start setup and the Welcome screen will be presented
  34. 34.  The Connection Entries screen is capable of holding multiple entries should multiple access sites. Click the New button at the top of the screen to open the Create New VPN Connection Entry dialog box, shown in Figure
  35. 35.  Authentication Tab Group Authentication—A username and password is necessary to complete the VPN profile.
  36. 36.  Transport Tab The Transport tab allows the configuration of transparent tunneling as well as the choice of whether to use IPsec over UDP or TCP.
  37. 37.  Backup Servers Tab: The VPN client contains a Backup Servers tab to configure a single connection with the capability to connect to multiple servers.
  38. 38. Finish the Connection Configuration From the main VPN Client window, you can establish a VPN connection by highlighting one of the profiles and clicking the Connect button at the top of the window. If the connection parameters were properly configured, the VPN connection is successful.
  39. 39.  After a VPN connection is established, various statistics about the connection are available. From the Status pull-down menu, select Statistics. This launches the Statistics window.

×