11
VPN BASICS By Kevin Stevens UAT NTS4150

By Kevin Stevens UAT NTS4150. Definition: A Virtual Private Network (VPN) is a technology that allows secure communication via a “tunnel,” across public

Embed Size (px)

Citation preview

Page 1: By Kevin Stevens UAT NTS4150. Definition: A Virtual Private Network (VPN) is a technology that allows secure communication via a “tunnel,” across public

VPN BASICSBy Kevin Stevens

UATNTS4150

Page 2: By Kevin Stevens UAT NTS4150. Definition: A Virtual Private Network (VPN) is a technology that allows secure communication via a “tunnel,” across public

VPN

Definition: A Virtual Private Network (VPN) is a

technology that allows secure communication via a “tunnel,” across public networks

Page 3: By Kevin Stevens UAT NTS4150. Definition: A Virtual Private Network (VPN) is a technology that allows secure communication via a “tunnel,” across public

Types of VPN’s

Hardware – A dedicated appliance specifically for use as a VPN.

-High performance-Quick implementation for large scale

deployment

Examples: SonicWALL NSA E8500

Page 4: By Kevin Stevens UAT NTS4150. Definition: A Virtual Private Network (VPN) is a technology that allows secure communication via a “tunnel,” across public

Types of VPN’s

Software – Software based VPN that can be installed on existing infrastructure.

-Lower capex (Possibly free)-Better compatibility with mixed

environments

Examples: OpenVPN, OpenSwan

Page 5: By Kevin Stevens UAT NTS4150. Definition: A Virtual Private Network (VPN) is a technology that allows secure communication via a “tunnel,” across public

VPN Advantages

Cost efficient compared to dedicated lines

Ability to secure traffic through public networks

Faster deployment than other solutions

Page 6: By Kevin Stevens UAT NTS4150. Definition: A Virtual Private Network (VPN) is a technology that allows secure communication via a “tunnel,” across public

VPN Disadvantages

No control over Internet bandwidth Increase in network administration Incompatibility issues Can open remote vectors of attack

Page 7: By Kevin Stevens UAT NTS4150. Definition: A Virtual Private Network (VPN) is a technology that allows secure communication via a “tunnel,” across public

VPN Configurations

Remote Access – establishes a remote connection on a client/server basis. Typically seen with telecommuters.

Network to network (site to site) – connects remote offices via end points.

Page 8: By Kevin Stevens UAT NTS4150. Definition: A Virtual Private Network (VPN) is a technology that allows secure communication via a “tunnel,” across public

VPN Tunneling Protocols

IPSec – Operates at the network layer. Provides functionality to encrypt and authenticate IP data.

PPTP – Point-to-Point tunneling protocol. Operates at the Data link layer. Uses PPP to encapsulate data.

L2TP – Layer 2 Tunneling Protocol. Operates at the Data link layer. Uses PPP to encapsulate data. A combination of L2F and PPTP.

SSL – Works at different levels of the OSI, giving it flexibility.

Page 9: By Kevin Stevens UAT NTS4150. Definition: A Virtual Private Network (VPN) is a technology that allows secure communication via a “tunnel,” across public

VPN Encryption Schemes

VPN’s can be setup with a myriad of encryption schemes. Here are some of the basics:

PPP – can provide encryption through Microsoft's Point-to-Point Encryption Protocol (MPPE). MPPE uses the RSA RC4 encryption algorithm.IPsec – provides encryption through the Encapsulating Security Payload (ESP). Supports various encryption algorithms.

SSL/TLS – provides a variety of encryption algorithms.

Page 10: By Kevin Stevens UAT NTS4150. Definition: A Virtual Private Network (VPN) is a technology that allows secure communication via a “tunnel,” across public

*Note*

The Virtual Private Network Consortium only supports the following secure VPN

technologies:

IPsec with encryption L2TP inside of IPsec SSL with encryption

Page 11: By Kevin Stevens UAT NTS4150. Definition: A Virtual Private Network (VPN) is a technology that allows secure communication via a “tunnel,” across public

References

Krutz L., R., & Vines, R. D. (2007). The CISSP and CAP Prep Guide. Indianapolis: Wiley Publishing.

Merkow, M., & Breithaupt, J. (2006). Information Security Principles and Practice. Upper Saddle River: Prentice Hall.

Northcutt, S., Zeltser, L., Winters, S., & Kent, K. R. (2005). Inside Network Security. Sams Publishing.

VPN Technologies: Definitions and Requirements. (n.d.). Retrieved November 28, 2010, from http://www.vpnc.org/vpn-technologies.html