SlideShare a Scribd company logo
Guide to Network Security
First Edition
Chapter Five
Network Authentication and Remote
Access Using VPN
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Objectives
• Define access control and identify the various ways
it can be implemented
• Explain why authentication is a critical aspect of
network access control
• Identify the component parts of virtual private
networks (VPNs)
• List and define the essential activities that an VPN
must be able to perform
• Explain the various VPN architectures in common
use
2
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Introduction
• Network security strategies authenticate machines:
– Rather than individuals
• Stronger level of authentication
– Network Access Control (NAC)
– VPN access controllers
• Main types of authentication performed by network
security devices
– Client
– User
– Session
3
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Access Control
• Access controls regulate admission into trusted
areas of the organization
– Logical access to information systems
– Physical access to facilities
• Made up of policies, programs, and technologies
• Processes
– Identification
– Authentication
– Authorization
– Accountability
4
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Access Control (cont’d.)
• Key principles of access control
– Least privilege
• Members allowed minimal amount of information
necessary to perform required duties
– Need to know
• Limits user’s access to specific information required
for a task
– Separation of duties
• Tasks are divided between two or more individuals
5
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Categories of Access Control
• Functional characteristics
– Deterrent
– Preventative
– Detective
– Corrective
– Recovery
– Compensating
6
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Categories of Access Control (cont’d.)
• NIST SP800-12 classification
– Management
– Operational
– Technical
• Mandatory access controls
– Controls enforced by computer system without
intervention from the data owner
7
© 2013 Course Technology/Cengage Learning. All Rights Reserved 8
Table 5-1 Examples of controls categorized by operational level
and functional characteristics
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Categories of Access Control (cont’d.)
• U.S. Military classification scheme
– Unclassified
– Sensitive but unclassified
– Confidential
– Secret
– Top Secret
• Discretionary access controls
– Implemented at the discretion of the data owner
9
© 2013 Course Technology/Cengage Learning. All Rights Reserved 10
Figure 5-1 Sample access control matrix
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Categories of Access Control (cont’d.)
• Nondiscretionary controls
– Determined by a central authority
– Can be either role-based or task-based
• Other forms of access control
– Content-dependent
– Constrained user interfaces
– Temporal (time-based) isolation
11
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Identification
• Process by which a computer system recognizes a
user’s identity
• Accounts are stored locally or centralized
• Default accounts
– Operating systems have a default user account
• Root (UNIX) or administrator (Windows)
– Default accounts should be renamed to make more
difficult to access
12
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Identification (cont’d.)
• Periodic reviews
– Performed by network administrators
– Ensure employee still works at the company
– Determine if employee still requires an account
13
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Authentication
• Act of confirming the identity or user account
• User proposes and verifies an identity with some
combination of:
– Something you know
• Password or passphrase
– Something you have
• Smart card or key
– Something you are
• Fingerprint, iris scan, or voiceprint
14
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Password Security Issues
• Cracking
– Guessing, breaking, or stealing passwords to gain
system access
– Methods: dictionary and brute force attacks
• Rainbow tables
– Contain hash outputs for many different password
combinations
• Password policies
– Guidelines to help enforce password confidentiality
15
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Password Security Issues (cont’d.)
• Example of a password policy
– At least eight characters
– Contain at least one uppercase character
– Contain at least one lowercase character
– Contain at least one number and symbol
– Contain no part of the user’s name
– Contain no words commonly found in a dictionary
– Contain no repeating characters
– Be combined with a salt when calculating hashes
16
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Password Security Issues (cont’d.)
• Example of password policy restrictions
– Users must change passwords at least every 90
days
– Remember 10 or more previously used passwords
– Lock accounts after three to five invalid login
attempts
• Lax security practices to avoid
– Using simple passwords
– Storing passwords on paper in readily visible areas
– Sharing passwords between systems or with others
17
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Password Security Issues (cont’d.)
• One-time password software
– Password generated for one-time use during a
single session
– Challenge-response passwords
– Password list passwords
– Token generators
18
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Implementing Authentication
• Most operating systems equipped with
authentication schemes
• Firewalls and VPN access controllers can perform
user authentication
• General process to authenticate users
– Client requests access to a resource
– Firewall prompts for username and password
– User submits information and is authenticated
– Request is checked against firewall’s rule base
– Request is granted or denied
19
© 2013 Course Technology/Cengage Learning. All Rights Reserved 20
Figure 5-2 Basic user authentication
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Implementing Authentication (cont’d.)
• User authentication
– Simplest type
– Authorized users added to access control lists
• Client authentication
– Similar to user authentication
– Includes usage limits
– Specific period of time or number of times
– Standard or specific sign-on is used
21
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Implementing Authentication (cont’d.)
• Network access control (NAC)
– Before a device may communicate on the network
• Must meet specific thresholds
– Device has authorized user credentials needed to
access network
– Device must have appropriate security tools and up-
to-date software versions
– Device has correct system configuration
– Device complies with security standards
22
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Implementing Authentication (cont’d.)
• Session authentication
– Requires authentication whenever client system
attempts connection
– A session is established
• Some advanced firewalls:
– Offer multiple authentication methods
23
© 2013 Course Technology/Cengage Learning. All Rights Reserved 24
Table 5-2 Authentication methods
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Implementing Authentication (cont’d.)
• Centralized authentication
– Central server maintains all user authorizations
• Also called authentication, authorization, and auditing
(AAA) server
– Can use several different authentication methods
• See Figure 5-4 for Kerberos
• See Tables 5-3 and 5-4 for TACACS+ and RADIUS
25
© 2013 Course Technology/Cengage Learning. All Rights Reserved 26
Figure 5-3 Centralized authentication
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved 27
Figure 5-4 Kerberos authentication
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved 28
Table 5-3 Characteristics of TACACS+ and RADIUS
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved 29
Table 5-4 Filtering rules for TACACS+ and RADIUS
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Virtual Private Networks
• Connects remote workers
• Older technology
– Dial-up connectivity
– Leased lines
– Remote Authentication Service
• Virtual private networks (VPNs)
– Provide secure point-to-point communication over
the public Internet
– Data is encapsulated and encrypted
30
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Extranets and Intranets
• Extranet
– Extension of organization’s network using the
Internet
• Intranet
– Logical network restricted to employees within the
organization
31
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Figure 5-5 VPN for intranets and extranets
© Cengage Learning 2013
32
© 2013 Course Technology/Cengage Learning. All Rights Reserved
VPN Components and Operations
• Many telecommunications companies provide VPN
services
• VPN components
– Hardware devices
– Software that performs security-related activities
• Endpoints or terminators
– Hardware devices at each end
– Perform encryption, authentication, and
encapsulation
33
© 2013 Course Technology/Cengage Learning. All Rights Reserved
VPN Components and Operations
(cont’d.)
• VPN tunnel
– Virtual communications path
– Uses TCP/IP
• See Figures 5-6, 5-7, and 5-8 for example VPN
configurations
34
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Figure 5-6 Simplified model VPN
© Cengage Learning 2013
35
© 2013 Course Technology/Cengage Learning. All Rights Reserved 36
Figure 5-7 Model VPN
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved 37
Figure 5-8 Common VPN
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Essential Activities of VPNs
• IP encapsulation
– Enclosing a packet within another packet
• Different IP source and destination information
• Data payload encryption
– Transport method encrypts traffic when generated
• Data is encrypted, not header
– Tunnel method encrypts data in transit
• Both header and data portions encrypted
38
© 2013 Course Technology/Cengage Learning. All Rights Reserved 39
Figure 5-9 VPN IP encapsulation with transport
encryption and tunnel encryption methods
© Cengage Learning 2013
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Essential Activities of VPNs (cont’d.)
• Encrypted authentication
– Encryption domain: everything in the protected
network behind the gateway
– Same cryptographic system that encrypts packets:
• Authenticates computers using the VPN
40
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Types of VPNs
• Site-to-site VPN
– Links two or more networks
• Client-to-site VPN
– Makes network accessible to remote users who
need dial-in access
• Two types not mutually exclusive
41
© 2013 Course Technology/Cengage Learning. All Rights Reserved
VPN Appliances
• Hardware device designed to terminate VPNs
– Permits connections among large number of users
– Does not provide file sharing and printing
• Software VPN
– Less expensive than hardware systems
– More scalable on fast-growing networks
• VPN combinations of hardware and software
– Implement a VPN appliance at the central network
– Use client software at remote end of each
connection
42
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Figure 5-10 Hardware VPN
© Cengage Learning 2013
43
© 2013 Course Technology/Cengage Learning. All Rights Reserved
VPN Architectures
• Mesh configuration
– Each participant in the VPN has an approved
relationship with every other participant
• Relationship called security association (SA)
• Hub-and-spoke configuration
– Single VPN router contains records of all SAs in the
VPN
– All communication flows through central router
• Router must have double the bandwidth of other
connections
44
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Figure 5-11 Mesh VPN
© Cengage Learning 2013
45
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Figure 5-12 Hub-and-spoke VPN
© Cengage Learning 2013
46
© 2013 Course Technology/Cengage Learning. All Rights Reserved
VPN Architectures
• Hybrid configuration
– Mixture of mesh and hub-and-spoke configurations
– Mesh configuration should handle time-critical
communications
– Overseas branches can be part of hub-and-spoke
configuration
47
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Tunneling Protocols Used with VPNs
• Proprietary protocols used in the past
• IPSec/IKE
– Standard for secure encrypted communication
– Uses two security methods
• Authenticated Headers (AH)
• Encapsulating Security Payload (ESP)
– Works in both transport and tunnel modes
• Point-to-point tunneling protocol (PPTP)
– Used for connection using dial-in modem
48
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Tunneling Protocols Used with VPNs
(cont’d.)
• Layer2 tunneling protocol (L2TP)
– Extension of PPP
– Provides secure authenticated remote access
– Separates process of initiating connection from
process of forwarding data
• UNIX-based methods for creating VPNs
– Point-to-point protocol over Secure Sockets Layer
– Point-to-point protocol over Secure Shell
49
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Table 5-5 VPN protocols and their uses
© Cengage Learning 2013
50
© 2013 Course Technology/Cengage Learning. All Rights Reserved
VPN Best Practices
• Create a VPN policy
– Identify who can use VPN
– Specify proper use of the VPN
• Determine where encryption/decryption will be
performed
– In relation to packet filtering
– See Figures 5-13 and 5-14 for external and internal
options
51
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Figure 5-13 External encryption
© Cengage Learning 2013
52
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Figure 5-14 Internal encryption
© Cengage Learning 2013
53
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Benefits and Drawbacks of VPNs
• Benefits
– Secure networking without overhead of maintaining
leased lines
– Packet encryption/translation overhead handled on
dedicated systems
• Decreased load on production machines
• Drawbacks
– Complex
– Can create network vulnerabilities if improperly
configured
54
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Benefits and Drawbacks of VPNs
(cont’d.)
• VPNs extend network boundaries
• Suggestions for dealing with increased risk
– Multifactor authentication
– Integrated virus protection
– NAC
– Usage limits
55
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Summary
• Network security devices require authentication:
– To assign different levels of authorization to different
users and groups
• Network security device authentication schemes
– User, client, and session
• Centralized authentication methods include
Kerberos, TACACS+, and RADIUS
• Passwords can be static or dynamically generated
• VPNs provide secure, point-to-point
communications over the Internet
56
© 2013 Course Technology/Cengage Learning. All Rights Reserved
Summary (cont’d.)
• VPNs can use mesh, hub-and-spoke, or hybrid
configurations
• Standard protocols today include IPSec/IKE,
PPTP, L2TP, PPP over SSL, and PPP over SSH
57

More Related Content

What's hot

Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
amiable_indian
 
access-control-week-2
access-control-week-2access-control-week-2
access-control-week-2jemtallon
 
PCI Compliance White Paper
PCI Compliance White PaperPCI Compliance White Paper
PCI Compliance White Paper
Raz-Lee Security
 
access-control-week-3
access-control-week-3access-control-week-3
access-control-week-3jemtallon
 
Physical security-system
Physical security-systemPhysical security-system
Physical security-system
Techera Consultants
 
Security models
Security models Security models
Security models
LJ PROJECTS
 
Operations_Security - Richard Mosher
Operations_Security - Richard MosherOperations_Security - Richard Mosher
Operations_Security - Richard Mosher
amiable_indian
 
Sensor GPP Presentation June 2008
Sensor GPP Presentation June 2008Sensor GPP Presentation June 2008
Sensor GPP Presentation June 2008
Edward vd Berg
 
AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014
KBIZEAU
 
Introducing Assure Security Risk Assessment
Introducing Assure Security Risk AssessmentIntroducing Assure Security Risk Assessment
Introducing Assure Security Risk Assessment
Precisely
 
8. operations security
8. operations security8. operations security
8. operations security7wounders
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
Pace IT at Edmonds Community College
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
jayussuryawan
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
Seth Nurul
 
PLN9 Surveillance
PLN9 SurveillancePLN9 Surveillance
Rajesh Gurunathan - Network security & Arcsight
Rajesh Gurunathan - Network security & ArcsightRajesh Gurunathan - Network security & Arcsight
Rajesh Gurunathan - Network security & ArcsightRajesh Gurunathan
 
Network management ppt
Network management pptNetwork management ppt
Network management ppt
DheerajPachauri
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
Pace IT at Edmonds Community College
 
Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1
Dinesh Kumar
 
Revealing the 2016 State of IBM i Security
Revealing the 2016 State of IBM i SecurityRevealing the 2016 State of IBM i Security
Revealing the 2016 State of IBM i Security
HelpSystems
 

What's hot (20)

Security Architecture
Security ArchitectureSecurity Architecture
Security Architecture
 
access-control-week-2
access-control-week-2access-control-week-2
access-control-week-2
 
PCI Compliance White Paper
PCI Compliance White PaperPCI Compliance White Paper
PCI Compliance White Paper
 
access-control-week-3
access-control-week-3access-control-week-3
access-control-week-3
 
Physical security-system
Physical security-systemPhysical security-system
Physical security-system
 
Security models
Security models Security models
Security models
 
Operations_Security - Richard Mosher
Operations_Security - Richard MosherOperations_Security - Richard Mosher
Operations_Security - Richard Mosher
 
Sensor GPP Presentation June 2008
Sensor GPP Presentation June 2008Sensor GPP Presentation June 2008
Sensor GPP Presentation June 2008
 
AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014AFAC session 2 - September 8, 2014
AFAC session 2 - September 8, 2014
 
Introducing Assure Security Risk Assessment
Introducing Assure Security Risk AssessmentIntroducing Assure Security Risk Assessment
Introducing Assure Security Risk Assessment
 
8. operations security
8. operations security8. operations security
8. operations security
 
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
PACE-IT, Security+ 4.2: Mobile Security Concepts and Technologies (part 1)
 
Chapter 3 security part i auditing operating systems and networks
Chapter 3 security part i  auditing operating systems and networksChapter 3 security part i  auditing operating systems and networks
Chapter 3 security part i auditing operating systems and networks
 
Chapter 7
Chapter 7Chapter 7
Chapter 7
 
PLN9 Surveillance
PLN9 SurveillancePLN9 Surveillance
PLN9 Surveillance
 
Rajesh Gurunathan - Network security & Arcsight
Rajesh Gurunathan - Network security & ArcsightRajesh Gurunathan - Network security & Arcsight
Rajesh Gurunathan - Network security & Arcsight
 
Network management ppt
Network management pptNetwork management ppt
Network management ppt
 
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative EnvironmentsPACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
PACE-IT, Security+ 4.5: Mitigating Risks in Alternative Environments
 
Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1Requirements for an internet connectivity solution 1
Requirements for an internet connectivity solution 1
 
Revealing the 2016 State of IBM i Security
Revealing the 2016 State of IBM i SecurityRevealing the 2016 State of IBM i Security
Revealing the 2016 State of IBM i Security
 

Viewers also liked

9780840024220 ppt ch09
9780840024220 ppt ch099780840024220 ppt ch09
9780840024220 ppt ch09
Kristin Harrison
 
Chapter 07
Chapter 07Chapter 07
Chapter 07
Kristin Harrison
 
9780840024220 ppt ch08
9780840024220 ppt ch089780840024220 ppt ch08
9780840024220 ppt ch08
Kristin Harrison
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
Kristin Harrison
 
rm, 10e ch02 copy
rm, 10e ch02 copyrm, 10e ch02 copy
rm, 10e ch02 copy
Kristin Harrison
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
Kristin Harrison
 
Chapter 09
Chapter 09Chapter 09
Chapter 09
Kristin Harrison
 
Chapter 04
Chapter 04Chapter 04
Chapter 04
Kristin Harrison
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
Kristin Harrison
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
Kristin Harrison
 
9781305119215 rm, 10e ch03
9781305119215 rm, 10e ch039781305119215 rm, 10e ch03
9781305119215 rm, 10e ch03
Kristin Harrison
 
9780840024220 ppt ch06
9780840024220 ppt ch069780840024220 ppt ch06
9780840024220 ppt ch06
Kristin Harrison
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
Kristin Harrison
 
baim_ch10
baim_ch10baim_ch10
baim_ch10baim08
 
Ch02 records management
Ch02 records managementCh02 records management
Ch02 records managementxtin101
 
Ch06 records management slide show part 2 with notes
Ch06 records management slide show part 2 with notesCh06 records management slide show part 2 with notes
Ch06 records management slide show part 2 with notes
francarter2
 
Ch07 records management
Ch07 records managementCh07 records management
Ch07 records managementxtin101
 
Healthcare Retrospect Part 1: All Americans Were Uninsured
Healthcare Retrospect Part 1: All Americans Were UninsuredHealthcare Retrospect Part 1: All Americans Were Uninsured
Healthcare Retrospect Part 1: All Americans Were Uninsured
BESLER
 

Viewers also liked (20)

9780840024220 ppt ch09
9780840024220 ppt ch099780840024220 ppt ch09
9780840024220 ppt ch09
 
Chapter 07
Chapter 07Chapter 07
Chapter 07
 
9780840024220 ppt ch08
9780840024220 ppt ch089780840024220 ppt ch08
9780840024220 ppt ch08
 
Chapter 12
Chapter 12Chapter 12
Chapter 12
 
9780840024220 ppt ch01
9780840024220 ppt ch019780840024220 ppt ch01
9780840024220 ppt ch01
 
rm, 10e ch02 copy
rm, 10e ch02 copyrm, 10e ch02 copy
rm, 10e ch02 copy
 
Chapter 14
Chapter 14Chapter 14
Chapter 14
 
Chapter 09
Chapter 09Chapter 09
Chapter 09
 
Chapter 04
Chapter 04Chapter 04
Chapter 04
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
Chapter 13
Chapter 13Chapter 13
Chapter 13
 
9781305119215 rm, 10e ch03
9781305119215 rm, 10e ch039781305119215 rm, 10e ch03
9781305119215 rm, 10e ch03
 
9780840024220 ppt ch06
9780840024220 ppt ch069780840024220 ppt ch06
9780840024220 ppt ch06
 
Chapter 11
Chapter 11Chapter 11
Chapter 11
 
Ppt cyberbullying
Ppt cyberbullyingPpt cyberbullying
Ppt cyberbullying
 
baim_ch10
baim_ch10baim_ch10
baim_ch10
 
Ch02 records management
Ch02 records managementCh02 records management
Ch02 records management
 
Ch06 records management slide show part 2 with notes
Ch06 records management slide show part 2 with notesCh06 records management slide show part 2 with notes
Ch06 records management slide show part 2 with notes
 
Ch07 records management
Ch07 records managementCh07 records management
Ch07 records management
 
Healthcare Retrospect Part 1: All Americans Were Uninsured
Healthcare Retrospect Part 1: All Americans Were UninsuredHealthcare Retrospect Part 1: All Americans Were Uninsured
Healthcare Retrospect Part 1: All Americans Were Uninsured
 

Similar to 9780840024220 ppt ch05

Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10
APSU
 
Chapter 11 Presentation
Chapter 11 PresentationChapter 11 Presentation
Chapter 11 Presentation
Amy McMullin
 
9780840024220 ppt ch04
9780840024220 ppt ch049780840024220 ppt ch04
9780840024220 ppt ch04
Kristin Harrison
 
security in is.pptx
security in is.pptxsecurity in is.pptx
security in is.pptx
selvapriyabiher
 
Information Security
Information SecurityInformation Security
Information Security
sonykhan3
 
ISBB_Chapter6.pptx
ISBB_Chapter6.pptxISBB_Chapter6.pptx
ISBB_Chapter6.pptx
AmanSoni665879
 
9780840024220 ppt ch10
9780840024220 ppt ch109780840024220 ppt ch10
9780840024220 ppt ch10
Kristin Harrison
 
Chapter 12 Access Management
Chapter 12 Access ManagementChapter 12 Access Management
Chapter 12 Access Management
Dr. Ahmed Al Zaidy
 
Coud discovery chap 5
Coud discovery chap 5Coud discovery chap 5
Coud discovery chap 5
Alain Charpentier
 
Cloud monitoring - An essential Platform Service
Cloud monitoring  - An essential Platform ServiceCloud monitoring  - An essential Platform Service
Cloud monitoring - An essential Platform Service
Soumitra Bhattacharyya
 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwari
bhanu krishna
 
Security Design Principles.ppt
 Security Design Principles.ppt Security Design Principles.ppt
Security Design Principles.ppt
DrBasemMohamedElomda
 
Lessson 1
Lessson 1Lessson 1
Secure Cloud Issues
Secure Cloud IssuesSecure Cloud Issues
Secure Cloud Issues
Devyani Vaidya
 
Chapter 7 Presentation
Chapter 7 PresentationChapter 7 Presentation
Chapter 7 Presentation
Amy McMullin
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
IJERA Editor
 
Fundamental_Security_Design_Principles.pptx
Fundamental_Security_Design_Principles.pptxFundamental_Security_Design_Principles.pptx
Fundamental_Security_Design_Principles.pptx
KelvinDube4
 
Access Control Fundamentals
Access Control FundamentalsAccess Control Fundamentals
Access Control Fundamentals
Setiya Nugroho
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
G Prachi
 

Similar to 9780840024220 ppt ch05 (20)

Net essentials6e ch10
Net essentials6e ch10Net essentials6e ch10
Net essentials6e ch10
 
Chapter 11 Presentation
Chapter 11 PresentationChapter 11 Presentation
Chapter 11 Presentation
 
9780840024220 ppt ch04
9780840024220 ppt ch049780840024220 ppt ch04
9780840024220 ppt ch04
 
security in is.pptx
security in is.pptxsecurity in is.pptx
security in is.pptx
 
Information Security
Information SecurityInformation Security
Information Security
 
ISBB_Chapter6.pptx
ISBB_Chapter6.pptxISBB_Chapter6.pptx
ISBB_Chapter6.pptx
 
9780840024220 ppt ch10
9780840024220 ppt ch109780840024220 ppt ch10
9780840024220 ppt ch10
 
Chapter 12 Access Management
Chapter 12 Access ManagementChapter 12 Access Management
Chapter 12 Access Management
 
Coud discovery chap 5
Coud discovery chap 5Coud discovery chap 5
Coud discovery chap 5
 
Cloud monitoring - An essential Platform Service
Cloud monitoring  - An essential Platform ServiceCloud monitoring  - An essential Platform Service
Cloud monitoring - An essential Platform Service
 
Security issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwariSecurity issue in cloud by himanshu tiwari
Security issue in cloud by himanshu tiwari
 
Security Design Principles.ppt
 Security Design Principles.ppt Security Design Principles.ppt
Security Design Principles.ppt
 
Lessson 1
Lessson 1Lessson 1
Lessson 1
 
Secure Cloud Issues
Secure Cloud IssuesSecure Cloud Issues
Secure Cloud Issues
 
Chapter 7 Presentation
Chapter 7 PresentationChapter 7 Presentation
Chapter 7 Presentation
 
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
Extensive Security and Performance Analysis Shows the Proposed Schemes Are Pr...
 
CyberArk
CyberArkCyberArk
CyberArk
 
Fundamental_Security_Design_Principles.pptx
Fundamental_Security_Design_Principles.pptxFundamental_Security_Design_Principles.pptx
Fundamental_Security_Design_Principles.pptx
 
Access Control Fundamentals
Access Control FundamentalsAccess Control Fundamentals
Access Control Fundamentals
 
Computer security concepts
Computer security conceptsComputer security concepts
Computer security concepts
 

More from Kristin Harrison

9780840024220 ppt ch12
9780840024220 ppt ch129780840024220 ppt ch12
9780840024220 ppt ch12
Kristin Harrison
 
9780840024220 ppt ch11
9780840024220 ppt ch119780840024220 ppt ch11
9780840024220 ppt ch11
Kristin Harrison
 
9780840024220 ppt ch03
9780840024220 ppt ch039780840024220 ppt ch03
9780840024220 ppt ch03
Kristin Harrison
 
9780840024220 ppt ch02
9780840024220 ppt ch029780840024220 ppt ch02
9780840024220 ppt ch02
Kristin Harrison
 
9780840024220 ppt ch07
9780840024220 ppt ch079780840024220 ppt ch07
9780840024220 ppt ch07
Kristin Harrison
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
Kristin Harrison
 
Chapter 05
Chapter 05Chapter 05
Chapter 05
Kristin Harrison
 
Chapter 06
Chapter 06Chapter 06
Chapter 06
Kristin Harrison
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
Kristin Harrison
 
Ppt2013 ch10
Ppt2013 ch10Ppt2013 ch10
Ppt2013 ch10
Kristin Harrison
 
Ppt2013 ch09
Ppt2013 ch09Ppt2013 ch09
Ppt2013 ch09
Kristin Harrison
 
Ppt2013 ch08
Ppt2013 ch08Ppt2013 ch08
Ppt2013 ch08
Kristin Harrison
 
Access2013 ch10
Access2013 ch10Access2013 ch10
Access2013 ch10
Kristin Harrison
 
Access2013 ch09
Access2013 ch09Access2013 ch09
Access2013 ch09
Kristin Harrison
 

More from Kristin Harrison (14)

9780840024220 ppt ch12
9780840024220 ppt ch129780840024220 ppt ch12
9780840024220 ppt ch12
 
9780840024220 ppt ch11
9780840024220 ppt ch119780840024220 ppt ch11
9780840024220 ppt ch11
 
9780840024220 ppt ch03
9780840024220 ppt ch039780840024220 ppt ch03
9780840024220 ppt ch03
 
9780840024220 ppt ch02
9780840024220 ppt ch029780840024220 ppt ch02
9780840024220 ppt ch02
 
9780840024220 ppt ch07
9780840024220 ppt ch079780840024220 ppt ch07
9780840024220 ppt ch07
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Chapter 05
Chapter 05Chapter 05
Chapter 05
 
Chapter 06
Chapter 06Chapter 06
Chapter 06
 
Chapter 01
Chapter 01Chapter 01
Chapter 01
 
Ppt2013 ch10
Ppt2013 ch10Ppt2013 ch10
Ppt2013 ch10
 
Ppt2013 ch09
Ppt2013 ch09Ppt2013 ch09
Ppt2013 ch09
 
Ppt2013 ch08
Ppt2013 ch08Ppt2013 ch08
Ppt2013 ch08
 
Access2013 ch10
Access2013 ch10Access2013 ch10
Access2013 ch10
 
Access2013 ch09
Access2013 ch09Access2013 ch09
Access2013 ch09
 

Recently uploaded

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
DhatriParmar
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
Mohammed Sikander
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
gb193092
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 

Recently uploaded (20)

Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptxThe Accursed House by Émile Gaboriau.pptx
The Accursed House by Émile Gaboriau.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Multithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race conditionMultithreading_in_C++ - std::thread, race condition
Multithreading_in_C++ - std::thread, race condition
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Marketing internship report file for MBA
Marketing internship report file for MBAMarketing internship report file for MBA
Marketing internship report file for MBA
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 

9780840024220 ppt ch05

  • 1. Guide to Network Security First Edition Chapter Five Network Authentication and Remote Access Using VPN
  • 2. © 2013 Course Technology/Cengage Learning. All Rights Reserved Objectives • Define access control and identify the various ways it can be implemented • Explain why authentication is a critical aspect of network access control • Identify the component parts of virtual private networks (VPNs) • List and define the essential activities that an VPN must be able to perform • Explain the various VPN architectures in common use 2
  • 3. © 2013 Course Technology/Cengage Learning. All Rights Reserved Introduction • Network security strategies authenticate machines: – Rather than individuals • Stronger level of authentication – Network Access Control (NAC) – VPN access controllers • Main types of authentication performed by network security devices – Client – User – Session 3
  • 4. © 2013 Course Technology/Cengage Learning. All Rights Reserved Access Control • Access controls regulate admission into trusted areas of the organization – Logical access to information systems – Physical access to facilities • Made up of policies, programs, and technologies • Processes – Identification – Authentication – Authorization – Accountability 4
  • 5. © 2013 Course Technology/Cengage Learning. All Rights Reserved Access Control (cont’d.) • Key principles of access control – Least privilege • Members allowed minimal amount of information necessary to perform required duties – Need to know • Limits user’s access to specific information required for a task – Separation of duties • Tasks are divided between two or more individuals 5
  • 6. © 2013 Course Technology/Cengage Learning. All Rights Reserved Categories of Access Control • Functional characteristics – Deterrent – Preventative – Detective – Corrective – Recovery – Compensating 6
  • 7. © 2013 Course Technology/Cengage Learning. All Rights Reserved Categories of Access Control (cont’d.) • NIST SP800-12 classification – Management – Operational – Technical • Mandatory access controls – Controls enforced by computer system without intervention from the data owner 7
  • 8. © 2013 Course Technology/Cengage Learning. All Rights Reserved 8 Table 5-1 Examples of controls categorized by operational level and functional characteristics © Cengage Learning 2013
  • 9. © 2013 Course Technology/Cengage Learning. All Rights Reserved Categories of Access Control (cont’d.) • U.S. Military classification scheme – Unclassified – Sensitive but unclassified – Confidential – Secret – Top Secret • Discretionary access controls – Implemented at the discretion of the data owner 9
  • 10. © 2013 Course Technology/Cengage Learning. All Rights Reserved 10 Figure 5-1 Sample access control matrix © Cengage Learning 2013
  • 11. © 2013 Course Technology/Cengage Learning. All Rights Reserved Categories of Access Control (cont’d.) • Nondiscretionary controls – Determined by a central authority – Can be either role-based or task-based • Other forms of access control – Content-dependent – Constrained user interfaces – Temporal (time-based) isolation 11
  • 12. © 2013 Course Technology/Cengage Learning. All Rights Reserved Identification • Process by which a computer system recognizes a user’s identity • Accounts are stored locally or centralized • Default accounts – Operating systems have a default user account • Root (UNIX) or administrator (Windows) – Default accounts should be renamed to make more difficult to access 12
  • 13. © 2013 Course Technology/Cengage Learning. All Rights Reserved Identification (cont’d.) • Periodic reviews – Performed by network administrators – Ensure employee still works at the company – Determine if employee still requires an account 13
  • 14. © 2013 Course Technology/Cengage Learning. All Rights Reserved Authentication • Act of confirming the identity or user account • User proposes and verifies an identity with some combination of: – Something you know • Password or passphrase – Something you have • Smart card or key – Something you are • Fingerprint, iris scan, or voiceprint 14
  • 15. © 2013 Course Technology/Cengage Learning. All Rights Reserved Password Security Issues • Cracking – Guessing, breaking, or stealing passwords to gain system access – Methods: dictionary and brute force attacks • Rainbow tables – Contain hash outputs for many different password combinations • Password policies – Guidelines to help enforce password confidentiality 15
  • 16. © 2013 Course Technology/Cengage Learning. All Rights Reserved Password Security Issues (cont’d.) • Example of a password policy – At least eight characters – Contain at least one uppercase character – Contain at least one lowercase character – Contain at least one number and symbol – Contain no part of the user’s name – Contain no words commonly found in a dictionary – Contain no repeating characters – Be combined with a salt when calculating hashes 16
  • 17. © 2013 Course Technology/Cengage Learning. All Rights Reserved Password Security Issues (cont’d.) • Example of password policy restrictions – Users must change passwords at least every 90 days – Remember 10 or more previously used passwords – Lock accounts after three to five invalid login attempts • Lax security practices to avoid – Using simple passwords – Storing passwords on paper in readily visible areas – Sharing passwords between systems or with others 17
  • 18. © 2013 Course Technology/Cengage Learning. All Rights Reserved Password Security Issues (cont’d.) • One-time password software – Password generated for one-time use during a single session – Challenge-response passwords – Password list passwords – Token generators 18
  • 19. © 2013 Course Technology/Cengage Learning. All Rights Reserved Implementing Authentication • Most operating systems equipped with authentication schemes • Firewalls and VPN access controllers can perform user authentication • General process to authenticate users – Client requests access to a resource – Firewall prompts for username and password – User submits information and is authenticated – Request is checked against firewall’s rule base – Request is granted or denied 19
  • 20. © 2013 Course Technology/Cengage Learning. All Rights Reserved 20 Figure 5-2 Basic user authentication © Cengage Learning 2013
  • 21. © 2013 Course Technology/Cengage Learning. All Rights Reserved Implementing Authentication (cont’d.) • User authentication – Simplest type – Authorized users added to access control lists • Client authentication – Similar to user authentication – Includes usage limits – Specific period of time or number of times – Standard or specific sign-on is used 21
  • 22. © 2013 Course Technology/Cengage Learning. All Rights Reserved Implementing Authentication (cont’d.) • Network access control (NAC) – Before a device may communicate on the network • Must meet specific thresholds – Device has authorized user credentials needed to access network – Device must have appropriate security tools and up- to-date software versions – Device has correct system configuration – Device complies with security standards 22
  • 23. © 2013 Course Technology/Cengage Learning. All Rights Reserved Implementing Authentication (cont’d.) • Session authentication – Requires authentication whenever client system attempts connection – A session is established • Some advanced firewalls: – Offer multiple authentication methods 23
  • 24. © 2013 Course Technology/Cengage Learning. All Rights Reserved 24 Table 5-2 Authentication methods © Cengage Learning 2013
  • 25. © 2013 Course Technology/Cengage Learning. All Rights Reserved Implementing Authentication (cont’d.) • Centralized authentication – Central server maintains all user authorizations • Also called authentication, authorization, and auditing (AAA) server – Can use several different authentication methods • See Figure 5-4 for Kerberos • See Tables 5-3 and 5-4 for TACACS+ and RADIUS 25
  • 26. © 2013 Course Technology/Cengage Learning. All Rights Reserved 26 Figure 5-3 Centralized authentication © Cengage Learning 2013
  • 27. © 2013 Course Technology/Cengage Learning. All Rights Reserved 27 Figure 5-4 Kerberos authentication © Cengage Learning 2013
  • 28. © 2013 Course Technology/Cengage Learning. All Rights Reserved 28 Table 5-3 Characteristics of TACACS+ and RADIUS © Cengage Learning 2013
  • 29. © 2013 Course Technology/Cengage Learning. All Rights Reserved 29 Table 5-4 Filtering rules for TACACS+ and RADIUS © Cengage Learning 2013
  • 30. © 2013 Course Technology/Cengage Learning. All Rights Reserved Virtual Private Networks • Connects remote workers • Older technology – Dial-up connectivity – Leased lines – Remote Authentication Service • Virtual private networks (VPNs) – Provide secure point-to-point communication over the public Internet – Data is encapsulated and encrypted 30
  • 31. © 2013 Course Technology/Cengage Learning. All Rights Reserved Extranets and Intranets • Extranet – Extension of organization’s network using the Internet • Intranet – Logical network restricted to employees within the organization 31
  • 32. © 2013 Course Technology/Cengage Learning. All Rights Reserved Figure 5-5 VPN for intranets and extranets © Cengage Learning 2013 32
  • 33. © 2013 Course Technology/Cengage Learning. All Rights Reserved VPN Components and Operations • Many telecommunications companies provide VPN services • VPN components – Hardware devices – Software that performs security-related activities • Endpoints or terminators – Hardware devices at each end – Perform encryption, authentication, and encapsulation 33
  • 34. © 2013 Course Technology/Cengage Learning. All Rights Reserved VPN Components and Operations (cont’d.) • VPN tunnel – Virtual communications path – Uses TCP/IP • See Figures 5-6, 5-7, and 5-8 for example VPN configurations 34
  • 35. © 2013 Course Technology/Cengage Learning. All Rights Reserved Figure 5-6 Simplified model VPN © Cengage Learning 2013 35
  • 36. © 2013 Course Technology/Cengage Learning. All Rights Reserved 36 Figure 5-7 Model VPN © Cengage Learning 2013
  • 37. © 2013 Course Technology/Cengage Learning. All Rights Reserved 37 Figure 5-8 Common VPN © Cengage Learning 2013
  • 38. © 2013 Course Technology/Cengage Learning. All Rights Reserved Essential Activities of VPNs • IP encapsulation – Enclosing a packet within another packet • Different IP source and destination information • Data payload encryption – Transport method encrypts traffic when generated • Data is encrypted, not header – Tunnel method encrypts data in transit • Both header and data portions encrypted 38
  • 39. © 2013 Course Technology/Cengage Learning. All Rights Reserved 39 Figure 5-9 VPN IP encapsulation with transport encryption and tunnel encryption methods © Cengage Learning 2013
  • 40. © 2013 Course Technology/Cengage Learning. All Rights Reserved Essential Activities of VPNs (cont’d.) • Encrypted authentication – Encryption domain: everything in the protected network behind the gateway – Same cryptographic system that encrypts packets: • Authenticates computers using the VPN 40
  • 41. © 2013 Course Technology/Cengage Learning. All Rights Reserved Types of VPNs • Site-to-site VPN – Links two or more networks • Client-to-site VPN – Makes network accessible to remote users who need dial-in access • Two types not mutually exclusive 41
  • 42. © 2013 Course Technology/Cengage Learning. All Rights Reserved VPN Appliances • Hardware device designed to terminate VPNs – Permits connections among large number of users – Does not provide file sharing and printing • Software VPN – Less expensive than hardware systems – More scalable on fast-growing networks • VPN combinations of hardware and software – Implement a VPN appliance at the central network – Use client software at remote end of each connection 42
  • 43. © 2013 Course Technology/Cengage Learning. All Rights Reserved Figure 5-10 Hardware VPN © Cengage Learning 2013 43
  • 44. © 2013 Course Technology/Cengage Learning. All Rights Reserved VPN Architectures • Mesh configuration – Each participant in the VPN has an approved relationship with every other participant • Relationship called security association (SA) • Hub-and-spoke configuration – Single VPN router contains records of all SAs in the VPN – All communication flows through central router • Router must have double the bandwidth of other connections 44
  • 45. © 2013 Course Technology/Cengage Learning. All Rights Reserved Figure 5-11 Mesh VPN © Cengage Learning 2013 45
  • 46. © 2013 Course Technology/Cengage Learning. All Rights Reserved Figure 5-12 Hub-and-spoke VPN © Cengage Learning 2013 46
  • 47. © 2013 Course Technology/Cengage Learning. All Rights Reserved VPN Architectures • Hybrid configuration – Mixture of mesh and hub-and-spoke configurations – Mesh configuration should handle time-critical communications – Overseas branches can be part of hub-and-spoke configuration 47
  • 48. © 2013 Course Technology/Cengage Learning. All Rights Reserved Tunneling Protocols Used with VPNs • Proprietary protocols used in the past • IPSec/IKE – Standard for secure encrypted communication – Uses two security methods • Authenticated Headers (AH) • Encapsulating Security Payload (ESP) – Works in both transport and tunnel modes • Point-to-point tunneling protocol (PPTP) – Used for connection using dial-in modem 48
  • 49. © 2013 Course Technology/Cengage Learning. All Rights Reserved Tunneling Protocols Used with VPNs (cont’d.) • Layer2 tunneling protocol (L2TP) – Extension of PPP – Provides secure authenticated remote access – Separates process of initiating connection from process of forwarding data • UNIX-based methods for creating VPNs – Point-to-point protocol over Secure Sockets Layer – Point-to-point protocol over Secure Shell 49
  • 50. © 2013 Course Technology/Cengage Learning. All Rights Reserved Table 5-5 VPN protocols and their uses © Cengage Learning 2013 50
  • 51. © 2013 Course Technology/Cengage Learning. All Rights Reserved VPN Best Practices • Create a VPN policy – Identify who can use VPN – Specify proper use of the VPN • Determine where encryption/decryption will be performed – In relation to packet filtering – See Figures 5-13 and 5-14 for external and internal options 51
  • 52. © 2013 Course Technology/Cengage Learning. All Rights Reserved Figure 5-13 External encryption © Cengage Learning 2013 52
  • 53. © 2013 Course Technology/Cengage Learning. All Rights Reserved Figure 5-14 Internal encryption © Cengage Learning 2013 53
  • 54. © 2013 Course Technology/Cengage Learning. All Rights Reserved Benefits and Drawbacks of VPNs • Benefits – Secure networking without overhead of maintaining leased lines – Packet encryption/translation overhead handled on dedicated systems • Decreased load on production machines • Drawbacks – Complex – Can create network vulnerabilities if improperly configured 54
  • 55. © 2013 Course Technology/Cengage Learning. All Rights Reserved Benefits and Drawbacks of VPNs (cont’d.) • VPNs extend network boundaries • Suggestions for dealing with increased risk – Multifactor authentication – Integrated virus protection – NAC – Usage limits 55
  • 56. © 2013 Course Technology/Cengage Learning. All Rights Reserved Summary • Network security devices require authentication: – To assign different levels of authorization to different users and groups • Network security device authentication schemes – User, client, and session • Centralized authentication methods include Kerberos, TACACS+, and RADIUS • Passwords can be static or dynamically generated • VPNs provide secure, point-to-point communications over the Internet 56
  • 57. © 2013 Course Technology/Cengage Learning. All Rights Reserved Summary (cont’d.) • VPNs can use mesh, hub-and-spoke, or hybrid configurations • Standard protocols today include IPSec/IKE, PPTP, L2TP, PPP over SSL, and PPP over SSH 57