0

building a virtual private network pdf

Virtual Private Network (VPN)

Virtual Private Network (VPN)

Kỹ thuật lập trình

... SUMMARYVPNs do not make use of dedicated leased linesVPNs send data through a secure tunnel that leads from one endpoint to another VPNs keep critical business communications private and secureVPN componentsVPN serversVPN clientsProtocols39TUNNELING PROTOCOLSLayer 2 Tunneling Protocol (L2TP)Provides better security through IPSecIPSec enables L2TP to performAuthenticationEncapsulationEncryption18TUNNELING PROTOCOLSSecure Shell (SSH)Provides authentication and encryptionWorks with UNIX­based systemsVersions for Windows are also availableUses public­key cryptographySocks V. 5Provides proxy services for applications That do not usually support proxyingSocks version 5 adds encrypted authentication and support for UDP2016ENCRYPTION SCHEMES USED BY VPNS (CONTINUED)Secure Sockets Layer (SSL) (continued)StepsServer uses its private key to decode pre­master codeGenerates a master secret keyClient and server use it to generate session keysServer and client exchange messages saying handshake is completedSSL session begins34SUMMARY (CONTINUED)VPN typesSite­to­siteClient­to­siteEncapsulation encloses one packet within another Conceals the original informationVPN protocolsSecure Shell (SSH)Socks version 5Point­to­Point Tunneling Protocol (PPTP)Layer 2 Tunneling Protocol (L2TP)40 Virtual Private Network (VPN) 29BIếN ĐổI ĐÓNG GÓI TRONG VPN (ENCAPSULATION)Các buớc trong tiến trình VPN Đóng gói (Encapsulation)Mã hoá (Encryption)Xác thực (Authentication)EncapsulationĐóng gói dữ liệu và các thông số khác nhauVí dụ như IP headerBảo vệ tính nguyên vẹn dữ liệu153127VPN CORE ACTIVITY 2: ENCRYPTIONEncryptionProcess of rendering information unreadable by all but the intended recipientComponentsKeyDigital certificateCertification Authority (CA)Key exchange methodsSymmetric cryptographyAsymmetric cryptographyInternet Key ExchangeFWZ2812SUMMARY (CONTINUED)IPSec/IKEEncryption makes the contents of the packet unreadableAuthentication ensures participating computers are authorized usersKerberos: strong authentication systemVPN advantagesHigh level of security at low costVPN disadvantagesCan introduce serious security risks412410255ENCRYPTION SCHEMES USED BY VPNSTriple Data Encryption Standard (3DES)Used by many VPN hardware and software3DES is a variation on Data Encryption Standard (DES)DES is not secure3DES is more secureThree separate 64­bit keys to process data3DES requires more computer resources than DES30WHY ESTABLISH A VPN?VPN combinationsCombining VPN hardware with software adds layers of network securityOne useful combination is a VPN bundled with a firewallVPNs do not eliminate the need for firewallsProvide flexibility and versatility13FIREWALL CONFIGURATION FOR VPNS37Protocol ... SUMMARYVPNs do not make use of dedicated leased linesVPNs send data through a secure tunnel that leads from one endpoint to another VPNs keep critical business communications private and secureVPN componentsVPN serversVPN clientsProtocols39TUNNELING PROTOCOLSLayer 2 Tunneling Protocol (L2TP)Provides better security through IPSecIPSec enables L2TP to performAuthenticationEncapsulationEncryption18TUNNELING PROTOCOLSSecure Shell (SSH)Provides authentication and encryptionWorks with UNIX­based systemsVersions for Windows are also availableUses public­key cryptographySocks V. 5Provides proxy services for applications That do not usually support proxyingSocks version 5 adds encrypted authentication and support for UDP2016ENCRYPTION SCHEMES USED BY VPNS (CONTINUED)Secure Sockets Layer (SSL) (continued)StepsServer uses its private key to decode pre­master codeGenerates a master secret keyClient and server use it to generate session keysServer and client exchange messages saying handshake is completedSSL session begins34SUMMARY (CONTINUED)VPN typesSite­to­siteClient­to­siteEncapsulation encloses one packet within another Conceals the original informationVPN protocolsSecure Shell (SSH)Socks version 5Point­to­Point Tunneling Protocol (PPTP)Layer 2 Tunneling Protocol (L2TP)40 Virtual Private Network (VPN) 29BIếN ĐổI ĐÓNG GÓI TRONG VPN (ENCAPSULATION)Các buớc trong tiến trình VPN Đóng gói (Encapsulation)Mã hoá (Encryption)Xác thực (Authentication)EncapsulationĐóng gói dữ liệu và các thông số khác nhauVí dụ như IP headerBảo vệ tính nguyên vẹn dữ liệu153127VPN CORE ACTIVITY 2: ENCRYPTIONEncryptionProcess of rendering information unreadable by all but the intended recipientComponentsKeyDigital certificateCertification Authority (CA)Key exchange methodsSymmetric cryptographyAsymmetric cryptographyInternet Key ExchangeFWZ2812SUMMARY (CONTINUED)IPSec/IKEEncryption makes the contents of the packet unreadableAuthentication ensures participating computers are authorized usersKerberos: strong authentication systemVPN advantagesHigh level of security at low costVPN disadvantagesCan introduce serious security risks412410255ENCRYPTION SCHEMES USED BY VPNSTriple Data Encryption Standard (3DES)Used by many VPN hardware and software3DES is a variation on Data Encryption Standard (DES)DES is not secure3DES is more secureThree separate 64­bit keys to process data3DES requires more computer resources than DES30WHY ESTABLISH A VPN?VPN combinationsCombining VPN hardware with software adds layers of network securityOne useful combination is a VPN bundled with a firewallVPNs do not eliminate the need for firewallsProvide flexibility and versatility13FIREWALL CONFIGURATION FOR VPNS37Protocol ... SUMMARYVPNs do not make use of dedicated leased linesVPNs send data through a secure tunnel that leads from one endpoint to another VPNs keep critical business communications private and secureVPN componentsVPN serversVPN clientsProtocols39TUNNELING PROTOCOLSLayer 2 Tunneling Protocol (L2TP)Provides better security through IPSecIPSec enables L2TP to performAuthenticationEncapsulationEncryption18TUNNELING PROTOCOLSSecure Shell (SSH)Provides authentication and encryptionWorks with UNIX­based systemsVersions for Windows are also availableUses public­key cryptographySocks V. 5Provides proxy services for applications That do not usually support proxyingSocks version 5 adds encrypted authentication and support for UDP2016ENCRYPTION SCHEMES USED BY VPNS (CONTINUED)Secure Sockets Layer (SSL) (continued)StepsServer uses its private key to decode pre­master codeGenerates a master secret keyClient and server use it to generate session keysServer and client exchange messages saying handshake is completedSSL session begins34SUMMARY (CONTINUED)VPN typesSite­to­siteClient­to­siteEncapsulation encloses one packet within another Conceals the original informationVPN protocolsSecure Shell (SSH)Socks version 5Point­to­Point Tunneling Protocol (PPTP)Layer 2 Tunneling Protocol (L2TP)40 Virtual Private Network (VPN) 29BIếN ĐổI ĐÓNG GÓI TRONG VPN (ENCAPSULATION)Các buớc trong tiến trình VPN Đóng gói (Encapsulation)Mã hoá (Encryption)Xác thực (Authentication)EncapsulationĐóng gói dữ liệu và các thông số khác nhauVí dụ như IP headerBảo vệ tính nguyên vẹn dữ liệu153127VPN CORE ACTIVITY 2: ENCRYPTIONEncryptionProcess of rendering information unreadable by all but the intended recipientComponentsKeyDigital certificateCertification Authority (CA)Key exchange methodsSymmetric cryptographyAsymmetric cryptographyInternet Key ExchangeFWZ2812SUMMARY (CONTINUED)IPSec/IKEEncryption makes the contents of the packet unreadableAuthentication ensures participating computers are authorized usersKerberos: strong authentication systemVPN advantagesHigh level of security at low costVPN disadvantagesCan introduce serious security risks412410255ENCRYPTION SCHEMES USED BY VPNSTriple Data Encryption Standard (3DES)Used by many VPN hardware and software3DES is a variation on Data Encryption Standard (DES)DES is not secure3DES is more secureThree separate 64­bit keys to process data3DES requires more computer resources than DES30WHY ESTABLISH A VPN?VPN combinationsCombining VPN hardware with software adds layers of network securityOne useful combination is a VPN bundled with a firewallVPNs do not eliminate the need for firewallsProvide flexibility and versatility13FIREWALL CONFIGURATION FOR VPNS37Protocol...
  • 41
  • 659
  • 2
Virtual Private Network -mạng riêng ảo- VPN

Virtual Private Network -mạng riêng ảo- VPN

Công nghệ thông tin

... header chuẩn phổ biến và ch a đ a chỉ IP c a FA, HA tham gia trong quá trình giao dịch. Tunnel packet header. Phần đầu này ch a 5 phần: - Protocol type. Trường này chỉ ra loại giao thức c a ... Máy chủ AAA. AAA : là viết tắt c a ba chữ Authentication (thẩm định quyền truy cập), Authorization (cho phép) và Accounting (kiểm soát). Các server này được dùng để đảm bảo truy cập an toàn ... clients. - Mã h a IPX, NetBEUI, NetBIOS, TCP/IP datagrams để tạo ra PPP datagrams và bảo mật dữ liệu trao đổi gi a các bên có liên quan. 2.2.1.3 Các thành phần c a quá trình giao dịch PPTP.•...
  • 36
  • 633
  • 3
VIRTUAL PRIVATE NETWORK (VPN)

VIRTUAL PRIVATE NETWORK (VPN)

Công nghệ thông tin

... gi a NAS và một thiết bị VPN Getway để truyền cácFrame, người sử dụng từ xa có thể kết nối đến NAS và truyền Frame PPP từ remoteuser đến VPN Getway trong đường hầm được tạo ra.1.3 L2TP (Layer ... về bảo mật c a công ty.Chính sách này bao gồm: qui trình (procedure), kỹ thuật, server (such as RemoteAuthentication Dial-In User Service [RADIUS], Terminal Access Controller AccessControl ... Tunnel, thay vì dùng GRE, đôi khi lại đóng vai_________________________________________________________________________ VIRTUAL PRIVATE NETWORK (VPN)Nhóm 18Lớp: DHTH3GV: Th.s Nguyễn H a Danh sách:1....
  • 12
  • 402
  • 0
Thí nghiệm TTDL & Mạng máy tính - Bài 3: VPN (VIRTUAL PRIVATE NETWORK)

Thí nghiệm TTDL & Mạng máy tính - Bài 3: VPN (VIRTUAL PRIVATE NETWORK)

Quản trị mạng

... dạng, mã h a và lọc gói dữ liệu. Nhận dạng c a PPTP cũng sử dụng EAP (Extensible Authentication Protocol), CHAP (Challenge Hanhdshake Authentication), PAP (Password Authentication Protocol). ... Máy chủ AAA AAA là viết tắt c a ba chữ Authentication (thẩm định quyền truy cập), Authorization (cho phép) và Accounting (kiểm soát). Các server này được dùng để đảm bảo truy cập an toàn hơn. ... name vpn_hcm là account mà dùng để quay số vào LAN c a Hà nội. Do LAN Hà nội không dùng domain active nên bỏ trống mục Domain 13. Nhấn Next. Trên trang Completing the Demand-Dial Interface...
  • 19
  • 558
  • 1
Lab 5.1.13a Building a Hub-based Network

Lab 5.1.13a Building a Hub-based Network

Quản trị mạng

... inexpensive and easy to install, but they permit collisions to occur. They are appropriate for a small LAN with light traffic. In addition to the physical and data link connections, which are Layers ... following IP address. 2 - 4 CCNA 1: Networking Basics v 3.0 - Lab 5.1.1 3a Copyright  2003, Cisco Systems, Inc. Lab 5.1.1 3a Building a Hub-based Network Objective • Create a simple network ... patch cable. Locate two cables that are long enough to reach from each PC to the hub. Attach one end to the NIC and the other end to a port on the hub. Be sure to examine the cable ends carefully...
  • 4
  • 353
  • 0
Lab 5.1.13b Building a Switch-based Network

Lab 5.1.13b Building a Switch-based Network

Quản trị mạng

... dedicated bandwidth to workstations. Switches eliminate collisions by creating microsegments between ports to which the two workstations are attached. They are appropriate for small to large LANs ... Layer 3, so that they can communicate. Since this lab uses a switch, a basic Category 5/5e UTP straight-through cable is needed to connect each PC to the switch. This is referred to as a patch ... information in the table. b. Note that the default gateway IP address is not required, since these computers are directly connected. The default gateway is only required on local area networks...
  • 4
  • 533
  • 0
Tài liệu Lab 5.1.13b Building a Switch-based Network pptx

Tài liệu Lab 5.1.13b Building a Switch-based Network pptx

Quản trị mạng

... creating 2-workstation microsegments between ports. They are appropriate for small to large LANs with moderate to heavy traffic. In addition to the physical and data link connections, which are ... and the switch will be accomplished using a cat 5 or 5e straight-through patch cable. Locate two cables that are long enough to reach from each PC to the switch. Attach one end to the NIC and ... straight-through cable is needed to connect each PC to the switch. This is referred to as a patch cable or horizontal cabling, which is used to connect workstations and a typical LAN. Start...
  • 4
  • 573
  • 0
Tài liệu Lab 5.2.3b Building a Basic Routed WAN pdf

Tài liệu Lab 5.2.3b Building a Basic Routed WAN pdf

Quản trị mạng

... with an RJ-45 Ethernet or Fast Ethernet interface (or an AUI interface) and at least one serial interface. • 10BASE-T AUI transceiver (DB-15 to RJ-45) for a router with an AUI Ethernet interface, ... Ethernet interface of the connected router. The default gateway is required on local area networks that are connected to a router. Computer IP Address Subnet mask Default Gateway PC – A 192.168.1.2 ... the example below. Set the IP address information for each PC according to the information in the table. Note that the IP address of each PC is on the same network as the default gateway, which...
  • 8
  • 440
  • 0
Tài liệu Configuring Virtual Private Networks pdf

Tài liệu Configuring Virtual Private Networks pdf

Quản trị mạng

... 19:48:33.631:%LINK-3-UPDOWN:Interface Virtual- Access1, changed state to up*Apr 22 19:48:33.631:Vi1 DDR:dialer_statechange(), state=4Dialer statechange to up Virtual- Access1*Apr 22 19:48:33.631:Vi1 DDR:dialer_out_call_connected()*Apr ... client(PPP peer)LNSAAA server(Radius/TACACS+)AAA server(Radius/TACACS+)Configuring Virtual Private NetworksTroubleshooting VPNsDNC-182Cisco IOS Dial Services Configuration Guide: Network ServicesL2TP ... before-forward request-dialindefault any subgroupforce-local-chap accept-dialininitiate-to request-dialin orrequest-dialoutlcp renegotiation accept-dialinlocal name any subgroupConfiguring Virtual...
  • 56
  • 286
  • 0
Tài liệu Virtual Private Network (VPN) Implementation Options pptx

Tài liệu Virtual Private Network (VPN) Implementation Options pptx

Quản trị mạng

... overlay or peer-to-peer VPN model.San Jose A AmsterdamWashingtonAtlantaParis A LondonInternational VCs(FR or ATM)San Jose BSanta ClaraSan MateoRedwoodsSanta CruzParis BNantesLyonMarseilleRegional ... Information Rate or CIR) and maximum bandwidth available on a certain VC (Peak Information Rate or PIR). The committed bandwidth guarantee usually is provided through the statistical nature ... mostly exchange data with the central sites and not with each other, as the data exchanged between the remote offices always gets transported via the central site. If the amount of data exchanged...
  • 32
  • 343
  • 0
Tài liệu Building a Cisco Network for Windows 2000 P1 pdf

Tài liệu Building a Cisco Network for Windows 2000 P1 pdf

Quản trị mạng

... my grandfather, Arthur Conat, drove a carriage with horses when he was a teenager. He didn’t have a TV,or a telephone, or a car, or a refrigerator, or a washing machine, orrunning water aside ... vision remains worldwide in scope.Annabel Dent, Anneka Baeten, Clare MacKenzie, and Laurie Giles of HarcourtAustralia for all their help.David Buckland, Wendi Wong, David Loh, Marie Chieng, ... are placing their bets that DEN will leadthe future of global internetworking. Now, any organization can takeadvantage of the benefits that DEN offers through the implementation of a combination...
  • 30
  • 411
  • 0

Xem thêm