SlideShare a Scribd company logo
1 of 73
Download to read offline
Guide to Network Defense and
Countermeasures
Third Edition
Chapter 11
Virtual Private Network (VPN) Concepts
Guide to Network Defense and Countermeasures, Second Edition 2
Objectives
• Explain basic VPN concepts
• Describe encapsulation in VPNs
• Describe encryption in VPNs
• Describe authentication in VPNs
• Summarize the advantages and disadvantages of
VPNs
Guide to Network Defense and Countermeasures, Second Edition 3
Objectives (contd.)
• Explain design considerations for a VPN
• Describe options for VPN configuration
• Explain how to set up VPNs with firewalls
• Explain how to adjust packet-filtering rules for VPNs
• Describe guidelines for auditing VPNs and VPN
policies
Guide to Network Defense and Countermeasures, Second Edition 4
Understanding VPN Concepts
• Virtual Private Network (VPN) enables computers to
– Communicate securely over insecure channels
– Exchange private encrypted messages that others
cannot decipher
Guide to Network Defense and Countermeasures, Second Edition 5
What VPNs Are
• VPN
– Virtual network connection
– Uses the Internet to establish a secure connection
• Secure tunnel
– Extends an organization’s network
• Endpoints
– Specified computers, users, or network gateways
Guide to Network Defense and Countermeasures, Second Edition 6
Guide to Network Defense and Countermeasures, Second Edition 7
Why Establish a VPN?
• Business incentives driving VPN adoption
– VPNs are cost-effective
– VPNs provide secure connection for remote users
• Contractors
• Traveling employees
• Partners and suppliers
• VPN Components
– VPN server or host
• Configured to accept connections from clients
– VPN client or guest
• Endpoints connecting to a VPN
Guide to Network Defense and Countermeasures, Second Edition 8
Why Establish a VPN? (continued)
• VPN Components
– Tunnel
• Connection through which data is sent
– VPN protocols
• Sets of standardized communication settings
• Used to encrypt data sent along the VPN
– Types of VPNs
• Site-to-site VPN
– Gateway-to-gateway VPN
• Client-to-site VPN
– Remote access VPN
Guide to Network Defense and Countermeasures, Second Edition 9
Why Establish a VPN? (continued)
• Hardware versus software VPNs
– Hardware-based VPNs
• Connect one gateway to another
• Routers at each network gateway encrypt and decrypt
packets
• VPN appliance
– Designed to serve as VPN endpoint
– Join multiple LANs
• Benefits
– Scalable
– Better security
Guide to Network Defense and Countermeasures, Second Edition 10
Guide to Network Defense and Countermeasures, Second Edition 11
Guide to Network Defense and Countermeasures, Second Edition 12
Why Establish a VPN? (continued)
• Hardware versus software VPNs (continued)
– Software-based VPNs
• Integrated with firewalls
• Appropriate when participating networks use different
routers and firewalls
• Benefits
– More cost-effective
– Offer maximum flexibility
Guide to Network Defense and Countermeasures, Second Edition 13
Guide to Network Defense and Countermeasures, Second Edition 14
Why Establish a VPN? (continued)
• VPN combinations
– Combining VPN hardware with software adds layers
of network security
– One useful combination is a VPN bundled with a
firewall
– VPNs do not eliminate the need for firewalls
– Provide flexibility and versatility
Guide to Network Defense and Countermeasures, Second Edition 15
Why Establish a VPN? (continued)
• VPN combinations (continued)
– Points to consider when selecting VPNs
• Compatibility
• Scalability
• Security
• Cost
• Vendor support
Guide to Network Defense and Countermeasures, Second Edition 16
VPN Core Activity 1: Encapsulation
• Core set of activities
– Encapsulation
– Encryption
– Authentication
• Encapsulation
– Encloses a packet within another
• That has different IP source and destination
– Protects integrity of the data
Guide to Network Defense and Countermeasures, Second Edition 17
Guide to Network Defense and Countermeasures, Second Edition 18
Understanding Tunneling Protocols
• Point-to-Point Tunneling Protocol (PPTP)
– Used when you need to dial in to a server with a
modem connection
• On a computer using an older OS version
– Encapsulates TCP/IP packets
– Header contains only information needed to route
data from the VPN client to the server
– Uses Microsoft Point-to-Point Encryption (MPPE)
• Encrypt data that passes between the remote computer
and the remote access server
– L2TP uses IPSec encryption
• More secure and widely supported
Guide to Network Defense and Countermeasures, Second Edition 19
Understanding Tunneling Protocols
(continued)
• Layer 2 Tunneling Protocol (L2TP)
– Provides better security through IPSec
– IPSec enables L2TP to perform
• Authentication
• Encapsulation
• Encryption
Guide to Network Defense and Countermeasures, Second Edition 20
Guide to Network Defense and Countermeasures, Second Edition 21
Understanding Tunneling Protocols
(continued)
• Secure Shell (SSH)
– Provides authentication and encryption
– Works with UNIX-based systems
• Versions for Windows are also available
– Uses public-key cryptography
• Socks V. 5
– Provides proxy services for applications
• That do not usually support proxying
– Socks version 5 adds encrypted authentication and
support for UDP
Guide to Network Defense and Countermeasures, Second Edition 22
IPSec/IKE
• Internet Protocol Security (IPSec)
– Set of standard procedures
– Developed by the Internet Engineering Task Force
(IETF)
– Enables secure communications on the Internet
• Characteristics
– Works at layer 3
– Can encrypt an entire TCP/IP packet
– Originally developed for use with IPv6
– Provides authentication of source and destination
computers
Guide to Network Defense and Countermeasures, Second Edition 23
IPSec/IKE (continued)
• Widely supported
• Security Association (SA)
– Relationship between two or more entities
– Describes how they will use security services to
communicate
– Used by IPSec to track all the particulars of a
communication session
– SAs are unidirectional
Guide to Network Defense and Countermeasures, Second Edition 24
IPSec/IKE (continued)
• Components
– Internet Security Association Key Management
Protocol (ISAKMP)
– Internet Key Exchange (IKE)
– Oakley
– IPSecurity Policy Management
– IPSec Driver
• IPSec core components
– Authentication Header (AH)
– Encapsulation Security Payload (ESP)
Guide to Network Defense and Countermeasures, Second Edition 25
IPSec/IKE (continued)
• Authentication Header (AH)
– Provides authentication of TCP/IP packets
– Ensures data integrity
– Packets are signed with a digital signature
– Adds a header calculated by the values in the
datagram
• Creating a messages digest of the datagram
– AH in tunnel mode
• Authenticates the entire original header
• Places a new header at the front of the original packet
– AH in transport mode
• Authenticates the payload and the header
Guide to Network Defense and Countermeasures, Second Edition 26
Guide to Network Defense and Countermeasures, Second Edition 27
Guide to Network Defense and Countermeasures, Second Edition 28
IPSec/IKE (continued)
• Encapsulation Security Payload (ESP)
– Provides confidentiality for messages
– Encrypts different parts of a TCP/IP packet
– ESP in tunnel mode
• Encrypts both the header and data part of each packet
• Data cannot pass through a firewall using NAT
– ESP in transport mode
• Encrypts only data portion of the packet
• Data can pass through a firewall
– IPSec should be configured to work with transport
mode
Guide to Network Defense and Countermeasures, Second Edition 29
Guide to Network Defense and Countermeasures, Second Edition 30
VPN Core Activity 2: Encryption
• Encryption
– Process of rendering information unreadable by all
but the intended recipient
– Components
• Key
• Digital certificate
• Certification Authority (CA)
– Key exchange methods
• Symmetric cryptography
• Asymmetric cryptography
• Internet Key Exchange
• FWZ
Guide to Network Defense and Countermeasures, Second Edition 31
Guide to Network Defense and Countermeasures, Second Edition 32
Encryption Schemes Used by VPNs
• Triple Data Encryption Standard (3DES)
– Used by many VPN hardware and software
– 3DES is a variation on Data Encryption Standard
(DES)
– DES is not secure
– 3DES is more secure
• Three separate 64-bit keys to process data
– 3DES requires more computer resources than DES
Guide to Network Defense and Countermeasures, Second Edition 33
Guide to Network Defense and Countermeasures, Second Edition 34
Encryption Schemes Used by VPNs
(continued)
• Secure Sockets Layer (SSL)
– Developed by Netscape Communications Corporation
– Enables Web servers and browsers to exchange
encrypted information
– Characteristics
• Uses public and private key encryption
• Uses sockets method of communication
• Operates at network layer (layer 3) of the OSI model
– Widely used on the Web
• Only supports data exchanged by Web-enabled
applications
• Unlikely to replace IPSec
Guide to Network Defense and Countermeasures, Second Edition 35
Encryption Schemes Used by VPNs
(continued)
• Secure Sockets Layer (SSL) (continued)
– Steps
• Client connects to Web server using SSL protocol
• Two machines arrange a “handshake” process
– Client sends its preferences for encryption method,
SSL version number, and a randomly generated
number
• Server responds with SSL version number, its own
cipher preferences, and its digital certificate
• Client verifies date and other information on the digital
certificate
– Client generates and send a “pre-master” code
Guide to Network Defense and Countermeasures, Second Edition 36
Encryption Schemes Used by VPNs
(continued)
• Secure Sockets Layer (SSL) (continued)
– Steps
• Server uses its private key to decode pre-master code
– Generates a master secret key
– Client and server use it to generate session keys
• Server and client exchange messages saying
handshake is completed
• SSL session begins
Guide to Network Defense and Countermeasures, Second Edition 37
VPN Core Activity 3: Authentication
• Authentication
– Identifying a user or computer as authorized to
access and use network resources
– Types of authentication methods used in VPNs
• IPSec
• MS-CHAP
– Both computers exchange authentication packets
and authenticate one another
– VPNs use digital certificates to authenticate users
Guide to Network Defense and Countermeasures, Second Edition 38
Guide to Network Defense and Countermeasures, Second Edition 39
Advantages and Disadvantages of
VPNs
Guide to Network Defense and Countermeasures, Second Edition 40
Designing a VPN
• Assess organization’s needs and goals
– Type of business
– How many employees it has
– Infrastructure already in place
– Security required
• Enforce security on the client side of the VPN tunnel
– Most difficult aspect of the design process
Guide to Network Defense and Countermeasures, Second Edition 41
Business Needs
• Business processes
– Determine how you will implement a VPN strategy
• Careful analysis of the existing infrastructure
– Helps you integrate the VPN with minimal disruption
• VPNs can be classified as site-to-site or client-to-site
– Can offer cost-effective, secure connectivity
• Legal implications to failing to secure access to a
remote network
Guide to Network Defense and Countermeasures, Second Edition 42
Business Needs (continued)
• Nature of the business
– What does it do?
– What product or service does it sell?
– Who are its customers?
– Cost is usually a key factor
• Narrows the choices of hardware and software
Guide to Network Defense and Countermeasures, Second Edition 43
Business Needs (continued)
• Nature of the business
– A secure VPN design should address:
• Secure connectivity
• Availability
• Authentication
• Secure management
• Reliability
• Scalability
• Performance
Guide to Network Defense and Countermeasures, Second Edition 44
Client Security
• Several ways to increase VPN client security
• Split tunneling
– Describes multiple paths
– One path goes to the VPN server and is secured
– Another unauthorized and unsecured path permits
users to connect to the Internet
• While still connected to the corporate VPN
– Leaves the VPN server and internal LAN vulnerable
to attack
Guide to Network Defense and Countermeasures, Second Edition 45
Guide to Network Defense and Countermeasures, Second Edition 46
Guide to Network Defense and Countermeasures, Second Edition 47
Client Security (continued)
• Planning VPN deployment
– Consider the existing infrastructure
• Make a network map
– Decide on the placement of VPN servers
– Research hardware and software to use
• Decide whether you need new hardware or software
• Sometimes you can reconfigure existing resources to
support a VPN
– Develop a list of requirements
• When you meet a vendor so nothing is overlooked
– Follow security policy guidelines
Guide to Network Defense and Countermeasures, Second Edition 48
VPN Topology Configurations
• VPN topology
– How components in a network are connected
physically to one another
– Determines how gateways, networks, and clients are
related to each other
– Corresponds to the basic physical and logical
topologies of any network
Guide to Network Defense and Countermeasures, Second Edition 49
VPN Topology Configurations
(continued)
• Mesh topology
– All participants in the VPN have Security Associations
(SAs) with one another
– Types of mesh arrangements
• Full mesh
– Every subnetwork is connected to all other subnets
in the VPN
– Complex to manage
• Partial mesh
– Any subnet in the VPN may or may not be
connected to the other subnets
Guide to Network Defense and Countermeasures, Second Edition 50
Guide to Network Defense and Countermeasures, Second Edition 51
VPN Topology Configurations
(continued)
• Star topology
– Also known as a hub-and-spoke configuration
– VPN gateway is the hub
– Networks that participate in the VPN are called rim
subnetworks
– Separate SAs are made between the hubs of each
rim subnetwork in the star configuration
– Central VPN router is at organization’s central office
– Any LANs or computers that want to participate need
to connect only to the central server
Guide to Network Defense and Countermeasures, Second Edition 52
Guide to Network Defense and Countermeasures, Second Edition 53
VPN Topology Configurations
(continued)
• Hybrid topology
– Combines two different network topologies
– Central core uses a mesh topology
• Mesh topologies tend to operate more efficiently
– Branch offices can be connected using a star
topology
– Benefits from strengths of each topology
• Scalability (of the star topology)
• Speed (of the mesh configuration)
Guide to Network Defense and Countermeasures, Second Edition 54
Guide to Network Defense and Countermeasures, Second Edition 55
Using VPNs with Firewalls
• VPNs do not reduce the need for a firewall
– Always use a firewall as part of VPN security design
• Install VPN software on the firewall itself
– Firewall allows outbound access to the Internet
– Firewall prevents inbound access from the Internet
– VPN service encrypts traffic to remote clients or
networks
Guide to Network Defense and Countermeasures, Second Edition 56
Using VPNs with Firewalls (continued)
• Install VPN software on the firewall itself
– Advantages
• Control all network access security from one server
• Fewer computers to manage
• Use the same tools for VPN and firewall
– Disadvantages
• Single point of failure
• Must configure routes carefully
• Internet access and VPN traffic compete for resources
on the server
Guide to Network Defense and Countermeasures, Second Edition 57
Guide to Network Defense and Countermeasures, Second Edition 58
Using VPNs with Firewalls (continued)
• Set up VPN parallel to your firewall inside the DMZ
– Advantages
• No need to modify firewall settings to support VPN
traffic
• Configuration scales more easily
• Can deal with congested servers
– Disadvantages
• VPN server is connected directly to the Internet
• If VPN server becomes compromised, attacker will
have direct access to your internal network
• Cost of supporting a VPN increases with new servers
Guide to Network Defense and Countermeasures, Second Edition 59
Guide to Network Defense and Countermeasures, Second Edition 60
Using VPNs with Firewalls (continued)
• Set up VPN server behind the firewall connected to
the internal network
– Advantages
• VPN server is completely protected from the Internet
• Firewall is the only device controlling access
• VPN traffic restrictions are configured on VPN server
– Disadvantages
• VPN traffic must travel through the firewall
• Firewall must handle VPN traffic
• Firewall might not know what to do with IP protocols
other than ICMP, TCP, and UDP
Guide to Network Defense and Countermeasures, Second Edition 61
Guide to Network Defense and Countermeasures, Second Edition 62
Adjusting Packet-Filtering Rules for
VPNs
• Perimeter firewall filters packets VPN sends or
receives
• Packet filtering is based on header fields of inbound
and outbound packets
• IP packet header fields used by packet filtering
– Source address
– Destination address
– Protocol identifier
• You can conduct packet filtering based on any or all
of these header fields
Guide to Network Defense and Countermeasures, Second Edition 63
PPTP Filters
• PPTP
– First widely supported VPN protocol
– Supports legacy authentication methods
– Does not require PKI
– Might be only option when VPN connections pass
through NAT
– PPTP uses two protocols
• TCP
• GRE
Guide to Network Defense and Countermeasures, Second Edition 64
Guide to Network Defense and Countermeasures, Second Edition 65
L2TP and IPSec Filters
• Need to set up rules that permit IPSec traffic
– IKE uses protocol ID 171 and UDP on port 500
– ESP uses protocol ID 50
– AH uses protocol ID 51
Guide to Network Defense and Countermeasures, Second Edition 66
Guide to Network Defense and Countermeasures, Second Edition 67
Auditing VPNs and VPN Policies
• Auditing needed to make sure organizations have a
well-define VPN policy
• Access policies define standards for connecting to
the organization’s network
– Must be integrated with the security policy
• Policies should be defined for different levels of
restrictions
• VPN endpoints are as vulnerable as internal network
computers
– Endpoints should also use antivirus software and
personal firewalls
Guide to Network Defense and Countermeasures, Second Edition 68
Auditing VPNs and VPN Policies
(continued)
• Test each client that will connect to your LAN
– Helps prevent network threats
• You can standardize VPN client for remote users
• Third-party solutions
– Cisco Secure VPN Client
– Nokia VPN Client
– SonicWALL VPN Client
• Verify everything is working according to your
policies
Guide to Network Defense and Countermeasures, Second Edition 69
Summary
• Business nature helps determine your VPN
requirements
• Decide placement of VPN servers
– Research hardware and software to use
• Establish a VPN domain
• VPN configurations
– Single entry point configurations
– Multiple entry point configurations
• VPNs need to be used with firewalls
Guide to Network Defense and Countermeasures, Second Edition 70
Summary (continued)
• Adjust packet-filtering rules
– To allow PPTP, L2TP, and IPSec traffic
• Auditing VPNs and VPN policies
– After you have installed and configured your VPN
• Work with a knowledgeable remote user
– Helps determine a baseline for future auditing, testing,
and troubleshooting
Guide to Network Defense and Countermeasures, Second Edition 71
Summary
• VPNs do not make use of dedicated leased lines
• VPNs send data through a secure tunnel that leads
from one endpoint to another
• VPNs keep critical business communications private
and secure
• VPN components
– VPN servers
– VPN clients
– Protocols
Guide to Network Defense and Countermeasures, Second Edition 72
Summary (continued)
• VPN types
– Site-to-site
– Client-to-site
• Encapsulation encloses one packet within another
– Conceals the original information
• VPN protocols
– Secure Shell (SSH)
– Socks version 5
– Point-to-Point Tunneling Protocol (PPTP)
– Layer 2 Tunneling Protocol (L2TP)
Guide to Network Defense and Countermeasures, Second Edition 73
Summary (continued)
• IPSec/IKE
• Encryption makes the contents of the packet
unreadable
• Authentication ensures participating computers are
authorized users
– Kerberos: strong authentication system
• VPN advantages
– High level of security at low cost
• VPN disadvantages
– Can introduce serious security risks

More Related Content

Similar to VPN Guide to Network Defense and countermeasures

Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networks
Divam Goyal
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
solimankellymattwe60
 
Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013
Travis Leong Ping
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
githe26200
 

Similar to VPN Guide to Network Defense and countermeasures (20)

WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 
Orascom-tehnical study final
Orascom-tehnical study finalOrascom-tehnical study final
Orascom-tehnical study final
 
28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)
 
28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)28 11 sep17 14aug 8386 9970-1-ed(edit)
28 11 sep17 14aug 8386 9970-1-ed(edit)
 
Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networks
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
 
VPN
VPNVPN
VPN
 
Vp ns
Vp nsVp ns
Vp ns
 
Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013Lecture 2 -_understanding_networks_2013
Lecture 2 -_understanding_networks_2013
 
Vpn
VpnVpn
Vpn
 
Katuwal_Arun_flex_get_vpn.pdf
Katuwal_Arun_flex_get_vpn.pdfKatuwal_Arun_flex_get_vpn.pdf
Katuwal_Arun_flex_get_vpn.pdf
 
Ip tunnelling and_vpn
Ip tunnelling and_vpnIp tunnelling and_vpn
Ip tunnelling and_vpn
 
What Technology Lies Behind VPN
What Technology Lies Behind VPNWhat Technology Lies Behind VPN
What Technology Lies Behind VPN
 
VPN in Virtualized DataCenter
VPN in Virtualized DataCenterVPN in Virtualized DataCenter
VPN in Virtualized DataCenter
 
IP Security
IP SecurityIP Security
IP Security
 
Session 2 Tp 2
Session 2 Tp 2Session 2 Tp 2
Session 2 Tp 2
 
Cyber security Chapter 05 Network Defenses
Cyber security Chapter 05 Network DefensesCyber security Chapter 05 Network Defenses
Cyber security Chapter 05 Network Defenses
 
Linux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic ControlLinux Based Advanced Routing with Firewall and Traffic Control
Linux Based Advanced Routing with Firewall and Traffic Control
 
Ip tunneling and vpns
Ip tunneling and vpnsIp tunneling and vpns
Ip tunneling and vpns
 

More from AliAlwesabi

More from AliAlwesabi (18)

pdfslide.net_ims-enabling-services-wherever-the-customer-and-whatever-the-acc...
pdfslide.net_ims-enabling-services-wherever-the-customer-and-whatever-the-acc...pdfslide.net_ims-enabling-services-wherever-the-customer-and-whatever-the-acc...
pdfslide.net_ims-enabling-services-wherever-the-customer-and-whatever-the-acc...
 
pdfslide.net_ims-basics-standardization-ims-components-and-ip-multimedia-subs...
pdfslide.net_ims-basics-standardization-ims-components-and-ip-multimedia-subs...pdfslide.net_ims-basics-standardization-ims-components-and-ip-multimedia-subs...
pdfslide.net_ims-basics-standardization-ims-components-and-ip-multimedia-subs...
 
pdfslide.net_status-of-ims-based-next-generation-networks-for-fixed-of-ims-ba...
pdfslide.net_status-of-ims-based-next-generation-networks-for-fixed-of-ims-ba...pdfslide.net_status-of-ims-based-next-generation-networks-for-fixed-of-ims-ba...
pdfslide.net_status-of-ims-based-next-generation-networks-for-fixed-of-ims-ba...
 
pdfslide.net_architectural-overview-of-ip-multimedia-subsystem-3-3gpp-ims-arc...
pdfslide.net_architectural-overview-of-ip-multimedia-subsystem-3-3gpp-ims-arc...pdfslide.net_architectural-overview-of-ip-multimedia-subsystem-3-3gpp-ims-arc...
pdfslide.net_architectural-overview-of-ip-multimedia-subsystem-3-3gpp-ims-arc...
 
lte-design-and-deployment-strategies-zeljko-savic.pdf
lte-design-and-deployment-strategies-zeljko-savic.pdflte-design-and-deployment-strategies-zeljko-savic.pdf
lte-design-and-deployment-strategies-zeljko-savic.pdf
 
Securing the LTE Core the Road to NFV 2014.pdf
Securing the LTE Core the Road to NFV 2014.pdfSecuring the LTE Core the Road to NFV 2014.pdf
Securing the LTE Core the Road to NFV 2014.pdf
 
us-19-Stone-Securing-The-System-A-Deep-Dive-Into-Reversing-Android-Preinstall...
us-19-Stone-Securing-The-System-A-Deep-Dive-Into-Reversing-Android-Preinstall...us-19-Stone-Securing-The-System-A-Deep-Dive-Into-Reversing-Android-Preinstall...
us-19-Stone-Securing-The-System-A-Deep-Dive-Into-Reversing-Android-Preinstall...
 
eu-19-Yazdanmehr-Mobile-Network-Hacking-IP-Edition-2.pdf
eu-19-Yazdanmehr-Mobile-Network-Hacking-IP-Edition-2.pdfeu-19-Yazdanmehr-Mobile-Network-Hacking-IP-Edition-2.pdf
eu-19-Yazdanmehr-Mobile-Network-Hacking-IP-Edition-2.pdf
 
CCC-AdaptiveMobileSecurity_WhoWatchesTheWatchers_v7_FINAL.pdf
CCC-AdaptiveMobileSecurity_WhoWatchesTheWatchers_v7_FINAL.pdfCCC-AdaptiveMobileSecurity_WhoWatchesTheWatchers_v7_FINAL.pdf
CCC-AdaptiveMobileSecurity_WhoWatchesTheWatchers_v7_FINAL.pdf
 
D1T2 - Bypassing GSMA Recommendations on SS7 Networks - Kirill Puzankov.pdf
D1T2 - Bypassing GSMA Recommendations on SS7 Networks - Kirill Puzankov.pdfD1T2 - Bypassing GSMA Recommendations on SS7 Networks - Kirill Puzankov.pdf
D1T2 - Bypassing GSMA Recommendations on SS7 Networks - Kirill Puzankov.pdf
 
D2T2 - Emmanuel Gadaix and Philippe Langlois - The SS7 Protocols.pdf
D2T2 - Emmanuel Gadaix and Philippe Langlois - The SS7 Protocols.pdfD2T2 - Emmanuel Gadaix and Philippe Langlois - The SS7 Protocols.pdf
D2T2 - Emmanuel Gadaix and Philippe Langlois - The SS7 Protocols.pdf
 
CISSP -Access Control Domain knowlege.pdf
CISSP -Access Control Domain knowlege.pdfCISSP -Access Control Domain knowlege.pdf
CISSP -Access Control Domain knowlege.pdf
 
zero trust - how to build zero trust.pdf
zero trust - how to build zero trust.pdfzero trust - how to build zero trust.pdf
zero trust - how to build zero trust.pdf
 
Foot printing as phase of Hacking in cybersecurity
Foot printing as phase of Hacking in cybersecurityFoot printing as phase of Hacking in cybersecurity
Foot printing as phase of Hacking in cybersecurity
 
Guide to Network Defense Router Security
Guide to Network Defense Router SecurityGuide to Network Defense Router Security
Guide to Network Defense Router Security
 
DNS Security Issues NES 554 for DNS Security
DNS Security Issues  NES 554 for DNS SecurityDNS Security Issues  NES 554 for DNS Security
DNS Security Issues NES 554 for DNS Security
 
Intrusion detection and prevention systems.pdf
Intrusion detection and prevention systems.pdfIntrusion detection and prevention systems.pdf
Intrusion detection and prevention systems.pdf
 
ISP Network Design workshops how to design networks
ISP Network Design workshops  how to design networksISP Network Design workshops  how to design networks
ISP Network Design workshops how to design networks
 

Recently uploaded

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
panagenda
 

Recently uploaded (20)

Syngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdfSyngulon - Selection technology May 2024.pdf
Syngulon - Selection technology May 2024.pdf
 
Overview of Hyperledger Foundation
Overview of Hyperledger FoundationOverview of Hyperledger Foundation
Overview of Hyperledger Foundation
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
IESVE for Early Stage Design and Planning
IESVE for Early Stage Design and PlanningIESVE for Early Stage Design and Planning
IESVE for Early Stage Design and Planning
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
Easier, Faster, and More Powerful – Alles Neu macht der Mai -Wir durchleuchte...
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
1111 ChatGPT Prompts PDF Free Download - Prompts for ChatGPT
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
Integrating Telephony Systems with Salesforce: Insights and Considerations, B...
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 

VPN Guide to Network Defense and countermeasures

  • 1. Guide to Network Defense and Countermeasures Third Edition Chapter 11 Virtual Private Network (VPN) Concepts
  • 2. Guide to Network Defense and Countermeasures, Second Edition 2 Objectives • Explain basic VPN concepts • Describe encapsulation in VPNs • Describe encryption in VPNs • Describe authentication in VPNs • Summarize the advantages and disadvantages of VPNs
  • 3. Guide to Network Defense and Countermeasures, Second Edition 3 Objectives (contd.) • Explain design considerations for a VPN • Describe options for VPN configuration • Explain how to set up VPNs with firewalls • Explain how to adjust packet-filtering rules for VPNs • Describe guidelines for auditing VPNs and VPN policies
  • 4. Guide to Network Defense and Countermeasures, Second Edition 4 Understanding VPN Concepts • Virtual Private Network (VPN) enables computers to – Communicate securely over insecure channels – Exchange private encrypted messages that others cannot decipher
  • 5. Guide to Network Defense and Countermeasures, Second Edition 5 What VPNs Are • VPN – Virtual network connection – Uses the Internet to establish a secure connection • Secure tunnel – Extends an organization’s network • Endpoints – Specified computers, users, or network gateways
  • 6. Guide to Network Defense and Countermeasures, Second Edition 6
  • 7. Guide to Network Defense and Countermeasures, Second Edition 7 Why Establish a VPN? • Business incentives driving VPN adoption – VPNs are cost-effective – VPNs provide secure connection for remote users • Contractors • Traveling employees • Partners and suppliers • VPN Components – VPN server or host • Configured to accept connections from clients – VPN client or guest • Endpoints connecting to a VPN
  • 8. Guide to Network Defense and Countermeasures, Second Edition 8 Why Establish a VPN? (continued) • VPN Components – Tunnel • Connection through which data is sent – VPN protocols • Sets of standardized communication settings • Used to encrypt data sent along the VPN – Types of VPNs • Site-to-site VPN – Gateway-to-gateway VPN • Client-to-site VPN – Remote access VPN
  • 9. Guide to Network Defense and Countermeasures, Second Edition 9 Why Establish a VPN? (continued) • Hardware versus software VPNs – Hardware-based VPNs • Connect one gateway to another • Routers at each network gateway encrypt and decrypt packets • VPN appliance – Designed to serve as VPN endpoint – Join multiple LANs • Benefits – Scalable – Better security
  • 10. Guide to Network Defense and Countermeasures, Second Edition 10
  • 11. Guide to Network Defense and Countermeasures, Second Edition 11
  • 12. Guide to Network Defense and Countermeasures, Second Edition 12 Why Establish a VPN? (continued) • Hardware versus software VPNs (continued) – Software-based VPNs • Integrated with firewalls • Appropriate when participating networks use different routers and firewalls • Benefits – More cost-effective – Offer maximum flexibility
  • 13. Guide to Network Defense and Countermeasures, Second Edition 13
  • 14. Guide to Network Defense and Countermeasures, Second Edition 14 Why Establish a VPN? (continued) • VPN combinations – Combining VPN hardware with software adds layers of network security – One useful combination is a VPN bundled with a firewall – VPNs do not eliminate the need for firewalls – Provide flexibility and versatility
  • 15. Guide to Network Defense and Countermeasures, Second Edition 15 Why Establish a VPN? (continued) • VPN combinations (continued) – Points to consider when selecting VPNs • Compatibility • Scalability • Security • Cost • Vendor support
  • 16. Guide to Network Defense and Countermeasures, Second Edition 16 VPN Core Activity 1: Encapsulation • Core set of activities – Encapsulation – Encryption – Authentication • Encapsulation – Encloses a packet within another • That has different IP source and destination – Protects integrity of the data
  • 17. Guide to Network Defense and Countermeasures, Second Edition 17
  • 18. Guide to Network Defense and Countermeasures, Second Edition 18 Understanding Tunneling Protocols • Point-to-Point Tunneling Protocol (PPTP) – Used when you need to dial in to a server with a modem connection • On a computer using an older OS version – Encapsulates TCP/IP packets – Header contains only information needed to route data from the VPN client to the server – Uses Microsoft Point-to-Point Encryption (MPPE) • Encrypt data that passes between the remote computer and the remote access server – L2TP uses IPSec encryption • More secure and widely supported
  • 19. Guide to Network Defense and Countermeasures, Second Edition 19 Understanding Tunneling Protocols (continued) • Layer 2 Tunneling Protocol (L2TP) – Provides better security through IPSec – IPSec enables L2TP to perform • Authentication • Encapsulation • Encryption
  • 20. Guide to Network Defense and Countermeasures, Second Edition 20
  • 21. Guide to Network Defense and Countermeasures, Second Edition 21 Understanding Tunneling Protocols (continued) • Secure Shell (SSH) – Provides authentication and encryption – Works with UNIX-based systems • Versions for Windows are also available – Uses public-key cryptography • Socks V. 5 – Provides proxy services for applications • That do not usually support proxying – Socks version 5 adds encrypted authentication and support for UDP
  • 22. Guide to Network Defense and Countermeasures, Second Edition 22 IPSec/IKE • Internet Protocol Security (IPSec) – Set of standard procedures – Developed by the Internet Engineering Task Force (IETF) – Enables secure communications on the Internet • Characteristics – Works at layer 3 – Can encrypt an entire TCP/IP packet – Originally developed for use with IPv6 – Provides authentication of source and destination computers
  • 23. Guide to Network Defense and Countermeasures, Second Edition 23 IPSec/IKE (continued) • Widely supported • Security Association (SA) – Relationship between two or more entities – Describes how they will use security services to communicate – Used by IPSec to track all the particulars of a communication session – SAs are unidirectional
  • 24. Guide to Network Defense and Countermeasures, Second Edition 24 IPSec/IKE (continued) • Components – Internet Security Association Key Management Protocol (ISAKMP) – Internet Key Exchange (IKE) – Oakley – IPSecurity Policy Management – IPSec Driver • IPSec core components – Authentication Header (AH) – Encapsulation Security Payload (ESP)
  • 25. Guide to Network Defense and Countermeasures, Second Edition 25 IPSec/IKE (continued) • Authentication Header (AH) – Provides authentication of TCP/IP packets – Ensures data integrity – Packets are signed with a digital signature – Adds a header calculated by the values in the datagram • Creating a messages digest of the datagram – AH in tunnel mode • Authenticates the entire original header • Places a new header at the front of the original packet – AH in transport mode • Authenticates the payload and the header
  • 26. Guide to Network Defense and Countermeasures, Second Edition 26
  • 27. Guide to Network Defense and Countermeasures, Second Edition 27
  • 28. Guide to Network Defense and Countermeasures, Second Edition 28 IPSec/IKE (continued) • Encapsulation Security Payload (ESP) – Provides confidentiality for messages – Encrypts different parts of a TCP/IP packet – ESP in tunnel mode • Encrypts both the header and data part of each packet • Data cannot pass through a firewall using NAT – ESP in transport mode • Encrypts only data portion of the packet • Data can pass through a firewall – IPSec should be configured to work with transport mode
  • 29. Guide to Network Defense and Countermeasures, Second Edition 29
  • 30. Guide to Network Defense and Countermeasures, Second Edition 30 VPN Core Activity 2: Encryption • Encryption – Process of rendering information unreadable by all but the intended recipient – Components • Key • Digital certificate • Certification Authority (CA) – Key exchange methods • Symmetric cryptography • Asymmetric cryptography • Internet Key Exchange • FWZ
  • 31. Guide to Network Defense and Countermeasures, Second Edition 31
  • 32. Guide to Network Defense and Countermeasures, Second Edition 32 Encryption Schemes Used by VPNs • Triple Data Encryption Standard (3DES) – Used by many VPN hardware and software – 3DES is a variation on Data Encryption Standard (DES) – DES is not secure – 3DES is more secure • Three separate 64-bit keys to process data – 3DES requires more computer resources than DES
  • 33. Guide to Network Defense and Countermeasures, Second Edition 33
  • 34. Guide to Network Defense and Countermeasures, Second Edition 34 Encryption Schemes Used by VPNs (continued) • Secure Sockets Layer (SSL) – Developed by Netscape Communications Corporation – Enables Web servers and browsers to exchange encrypted information – Characteristics • Uses public and private key encryption • Uses sockets method of communication • Operates at network layer (layer 3) of the OSI model – Widely used on the Web • Only supports data exchanged by Web-enabled applications • Unlikely to replace IPSec
  • 35. Guide to Network Defense and Countermeasures, Second Edition 35 Encryption Schemes Used by VPNs (continued) • Secure Sockets Layer (SSL) (continued) – Steps • Client connects to Web server using SSL protocol • Two machines arrange a “handshake” process – Client sends its preferences for encryption method, SSL version number, and a randomly generated number • Server responds with SSL version number, its own cipher preferences, and its digital certificate • Client verifies date and other information on the digital certificate – Client generates and send a “pre-master” code
  • 36. Guide to Network Defense and Countermeasures, Second Edition 36 Encryption Schemes Used by VPNs (continued) • Secure Sockets Layer (SSL) (continued) – Steps • Server uses its private key to decode pre-master code – Generates a master secret key – Client and server use it to generate session keys • Server and client exchange messages saying handshake is completed • SSL session begins
  • 37. Guide to Network Defense and Countermeasures, Second Edition 37 VPN Core Activity 3: Authentication • Authentication – Identifying a user or computer as authorized to access and use network resources – Types of authentication methods used in VPNs • IPSec • MS-CHAP – Both computers exchange authentication packets and authenticate one another – VPNs use digital certificates to authenticate users
  • 38. Guide to Network Defense and Countermeasures, Second Edition 38
  • 39. Guide to Network Defense and Countermeasures, Second Edition 39 Advantages and Disadvantages of VPNs
  • 40. Guide to Network Defense and Countermeasures, Second Edition 40 Designing a VPN • Assess organization’s needs and goals – Type of business – How many employees it has – Infrastructure already in place – Security required • Enforce security on the client side of the VPN tunnel – Most difficult aspect of the design process
  • 41. Guide to Network Defense and Countermeasures, Second Edition 41 Business Needs • Business processes – Determine how you will implement a VPN strategy • Careful analysis of the existing infrastructure – Helps you integrate the VPN with minimal disruption • VPNs can be classified as site-to-site or client-to-site – Can offer cost-effective, secure connectivity • Legal implications to failing to secure access to a remote network
  • 42. Guide to Network Defense and Countermeasures, Second Edition 42 Business Needs (continued) • Nature of the business – What does it do? – What product or service does it sell? – Who are its customers? – Cost is usually a key factor • Narrows the choices of hardware and software
  • 43. Guide to Network Defense and Countermeasures, Second Edition 43 Business Needs (continued) • Nature of the business – A secure VPN design should address: • Secure connectivity • Availability • Authentication • Secure management • Reliability • Scalability • Performance
  • 44. Guide to Network Defense and Countermeasures, Second Edition 44 Client Security • Several ways to increase VPN client security • Split tunneling – Describes multiple paths – One path goes to the VPN server and is secured – Another unauthorized and unsecured path permits users to connect to the Internet • While still connected to the corporate VPN – Leaves the VPN server and internal LAN vulnerable to attack
  • 45. Guide to Network Defense and Countermeasures, Second Edition 45
  • 46. Guide to Network Defense and Countermeasures, Second Edition 46
  • 47. Guide to Network Defense and Countermeasures, Second Edition 47 Client Security (continued) • Planning VPN deployment – Consider the existing infrastructure • Make a network map – Decide on the placement of VPN servers – Research hardware and software to use • Decide whether you need new hardware or software • Sometimes you can reconfigure existing resources to support a VPN – Develop a list of requirements • When you meet a vendor so nothing is overlooked – Follow security policy guidelines
  • 48. Guide to Network Defense and Countermeasures, Second Edition 48 VPN Topology Configurations • VPN topology – How components in a network are connected physically to one another – Determines how gateways, networks, and clients are related to each other – Corresponds to the basic physical and logical topologies of any network
  • 49. Guide to Network Defense and Countermeasures, Second Edition 49 VPN Topology Configurations (continued) • Mesh topology – All participants in the VPN have Security Associations (SAs) with one another – Types of mesh arrangements • Full mesh – Every subnetwork is connected to all other subnets in the VPN – Complex to manage • Partial mesh – Any subnet in the VPN may or may not be connected to the other subnets
  • 50. Guide to Network Defense and Countermeasures, Second Edition 50
  • 51. Guide to Network Defense and Countermeasures, Second Edition 51 VPN Topology Configurations (continued) • Star topology – Also known as a hub-and-spoke configuration – VPN gateway is the hub – Networks that participate in the VPN are called rim subnetworks – Separate SAs are made between the hubs of each rim subnetwork in the star configuration – Central VPN router is at organization’s central office – Any LANs or computers that want to participate need to connect only to the central server
  • 52. Guide to Network Defense and Countermeasures, Second Edition 52
  • 53. Guide to Network Defense and Countermeasures, Second Edition 53 VPN Topology Configurations (continued) • Hybrid topology – Combines two different network topologies – Central core uses a mesh topology • Mesh topologies tend to operate more efficiently – Branch offices can be connected using a star topology – Benefits from strengths of each topology • Scalability (of the star topology) • Speed (of the mesh configuration)
  • 54. Guide to Network Defense and Countermeasures, Second Edition 54
  • 55. Guide to Network Defense and Countermeasures, Second Edition 55 Using VPNs with Firewalls • VPNs do not reduce the need for a firewall – Always use a firewall as part of VPN security design • Install VPN software on the firewall itself – Firewall allows outbound access to the Internet – Firewall prevents inbound access from the Internet – VPN service encrypts traffic to remote clients or networks
  • 56. Guide to Network Defense and Countermeasures, Second Edition 56 Using VPNs with Firewalls (continued) • Install VPN software on the firewall itself – Advantages • Control all network access security from one server • Fewer computers to manage • Use the same tools for VPN and firewall – Disadvantages • Single point of failure • Must configure routes carefully • Internet access and VPN traffic compete for resources on the server
  • 57. Guide to Network Defense and Countermeasures, Second Edition 57
  • 58. Guide to Network Defense and Countermeasures, Second Edition 58 Using VPNs with Firewalls (continued) • Set up VPN parallel to your firewall inside the DMZ – Advantages • No need to modify firewall settings to support VPN traffic • Configuration scales more easily • Can deal with congested servers – Disadvantages • VPN server is connected directly to the Internet • If VPN server becomes compromised, attacker will have direct access to your internal network • Cost of supporting a VPN increases with new servers
  • 59. Guide to Network Defense and Countermeasures, Second Edition 59
  • 60. Guide to Network Defense and Countermeasures, Second Edition 60 Using VPNs with Firewalls (continued) • Set up VPN server behind the firewall connected to the internal network – Advantages • VPN server is completely protected from the Internet • Firewall is the only device controlling access • VPN traffic restrictions are configured on VPN server – Disadvantages • VPN traffic must travel through the firewall • Firewall must handle VPN traffic • Firewall might not know what to do with IP protocols other than ICMP, TCP, and UDP
  • 61. Guide to Network Defense and Countermeasures, Second Edition 61
  • 62. Guide to Network Defense and Countermeasures, Second Edition 62 Adjusting Packet-Filtering Rules for VPNs • Perimeter firewall filters packets VPN sends or receives • Packet filtering is based on header fields of inbound and outbound packets • IP packet header fields used by packet filtering – Source address – Destination address – Protocol identifier • You can conduct packet filtering based on any or all of these header fields
  • 63. Guide to Network Defense and Countermeasures, Second Edition 63 PPTP Filters • PPTP – First widely supported VPN protocol – Supports legacy authentication methods – Does not require PKI – Might be only option when VPN connections pass through NAT – PPTP uses two protocols • TCP • GRE
  • 64. Guide to Network Defense and Countermeasures, Second Edition 64
  • 65. Guide to Network Defense and Countermeasures, Second Edition 65 L2TP and IPSec Filters • Need to set up rules that permit IPSec traffic – IKE uses protocol ID 171 and UDP on port 500 – ESP uses protocol ID 50 – AH uses protocol ID 51
  • 66. Guide to Network Defense and Countermeasures, Second Edition 66
  • 67. Guide to Network Defense and Countermeasures, Second Edition 67 Auditing VPNs and VPN Policies • Auditing needed to make sure organizations have a well-define VPN policy • Access policies define standards for connecting to the organization’s network – Must be integrated with the security policy • Policies should be defined for different levels of restrictions • VPN endpoints are as vulnerable as internal network computers – Endpoints should also use antivirus software and personal firewalls
  • 68. Guide to Network Defense and Countermeasures, Second Edition 68 Auditing VPNs and VPN Policies (continued) • Test each client that will connect to your LAN – Helps prevent network threats • You can standardize VPN client for remote users • Third-party solutions – Cisco Secure VPN Client – Nokia VPN Client – SonicWALL VPN Client • Verify everything is working according to your policies
  • 69. Guide to Network Defense and Countermeasures, Second Edition 69 Summary • Business nature helps determine your VPN requirements • Decide placement of VPN servers – Research hardware and software to use • Establish a VPN domain • VPN configurations – Single entry point configurations – Multiple entry point configurations • VPNs need to be used with firewalls
  • 70. Guide to Network Defense and Countermeasures, Second Edition 70 Summary (continued) • Adjust packet-filtering rules – To allow PPTP, L2TP, and IPSec traffic • Auditing VPNs and VPN policies – After you have installed and configured your VPN • Work with a knowledgeable remote user – Helps determine a baseline for future auditing, testing, and troubleshooting
  • 71. Guide to Network Defense and Countermeasures, Second Edition 71 Summary • VPNs do not make use of dedicated leased lines • VPNs send data through a secure tunnel that leads from one endpoint to another • VPNs keep critical business communications private and secure • VPN components – VPN servers – VPN clients – Protocols
  • 72. Guide to Network Defense and Countermeasures, Second Edition 72 Summary (continued) • VPN types – Site-to-site – Client-to-site • Encapsulation encloses one packet within another – Conceals the original information • VPN protocols – Secure Shell (SSH) – Socks version 5 – Point-to-Point Tunneling Protocol (PPTP) – Layer 2 Tunneling Protocol (L2TP)
  • 73. Guide to Network Defense and Countermeasures, Second Edition 73 Summary (continued) • IPSec/IKE • Encryption makes the contents of the packet unreadable • Authentication ensures participating computers are authorized users – Kerberos: strong authentication system • VPN advantages – High level of security at low cost • VPN disadvantages – Can introduce serious security risks