82
Virtual Private Network (VPN) © N. Ganesan, Ph.D.

Virtual Private Network (VPN) © N. Ganesan, Ph.D

Embed Size (px)

Citation preview

Page 1: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Virtual Private Network (VPN)

© N. Ganesan, Ph.D.

Page 2: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Chapter Objectives

Page 3: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Chapter Modules

Page 4: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Primary Reference

• VPN Overview by Microsoft

Page 5: Virtual Private Network (VPN) © N. Ganesan, Ph.D

VPN

• A virtual private network that is established over, in general, the Internet

• It is virtual because it exists as a virtual entity within a public network

• It is private because it is confined to a set of private users

Page 6: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Why is it a Virtual Private Network?

• From the user’s perspective, it appears as a network consisting of dedicated network links

• These links appear as if they are reserved for the VPN clientele

• Because of encryption, the network appears to be private

Page 7: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Example of a VPN

Page 8: Virtual Private Network (VPN) © N. Ganesan, Ph.D

VPN Major Characteristics

• Must emulate a point-to-point link– Done by encapsulating the data that

would facilitate allow it to travel the Internet to reach the end point

• Must emulate a private link– Done by encrypting the data in the

data packets

Page 9: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Typical VPN Connection

Page 10: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Tunnel and Connections

• Tunnel– The portion of the network where the

data is encapsulated

• Connection– The portion of the network where the

data is encrypted

Page 11: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Application Areas

• In general, provide users with connection to the corporate network regardless of their location

• The alternative of using truly dedicated lines for a private network are expensive propositions

Page 12: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Some Common Uses of VPN

• Provide users with secured remote access over the Internet to corporate resources

• Connect two computer networks securely over the Internet– Example: Connect a branch office network

to the network in the head office

• Secure part of a corporate network for security and confidentiality purpose

Page 13: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Remote Access Over the Internet

Page 14: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Connecting Two Computer Networks Securely

Page 15: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Securing a Part of the Corporate Network

Page 16: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Basic VPN Requirements

• User Authentication• Address Management • Data Encryption• Key Management• Multi-protocol Support

Page 17: Virtual Private Network (VPN) © N. Ganesan, Ph.D

User Authentication

• VPN must be able to verify user authentication and allow only authorized users to access the network

Page 18: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Address Management

• Assign addresses to clients and ensure that private addresses are kept private on the VPN

Page 19: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Data Encryption

• Encrypt and decrypt the data to ensure that others on the not have access to the data

Page 20: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Key Management

• Keys must be generated and refreshed for encryption at the server and the client

• Note that keys are required for encryption

Page 21: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Multi-protocol Support

• The VPN technology must support commons protocols on the Internet such as IP, IPX etc.

Page 22: Virtual Private Network (VPN) © N. Ganesan, Ph.D

VPN Implementation Protocols

• Point-to-Point Tunneling Protocol (PPTP) of Layer 2 Tunneling Protocol (L2TP)

• IPSec

Page 23: Virtual Private Network (VPN) © N. Ganesan, Ph.D

More on Tunneling

• Tunneling involves the encapsulation, transmission and decapsulation of data packets

• The data is encapsulated with additional headers

• The additional headers provide routing information for encapsulated data to be routed between the end points of a tunnel

Page 24: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Tunneling

Page 25: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Point-to-Point Tunneling Protocol (PPTP)

• Encapsulate and encrypt the data to be sent over a corporate or public IP network

Page 26: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Level 2 Tunneling Protocol

• Encrypted and encapsulated to be sent over a communication links that support user datagram mode of transmission – Examples of links include X.25, Frame

Relay and ATM

Page 27: Virtual Private Network (VPN) © N. Ganesan, Ph.D

IPSec Tunnel Mode

• Encapsulate and encrypt in an IP header for transmission over an IP network

Page 28: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Layer 2 Tunneling Protocols

• PPTP• L2TP• Both encapsulate the payload in a

PPP frame

Page 29: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Layer 3 Tunneling Protocol

• IPSec Tunneling Mode– Encapsulates the payload in an

additional IP header

Page 30: Virtual Private Network (VPN) © N. Ganesan, Ph.D

PPP Format

Page 31: Virtual Private Network (VPN) © N. Ganesan, Ph.D

PPTP Format

Page 32: Virtual Private Network (VPN) © N. Ganesan, Ph.D

L2TP Format

Page 33: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Windows Implementation of VPN

• L2TP for tunneling• IPSec for encryption • Known as L2TP/IPSec

Page 34: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Windows Implementation

Page 35: Virtual Private Network (VPN) © N. Ganesan, Ph.D

IPSec Tunnel Mode

• Supports only IP networks

Page 36: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Tunnel Types

• Voluntary– VPN request is initiated by the client– The client remains the end point

• Compulsory – VPN access server creates a compulsory

tunnel for the client – In this case, the dial-up access server

between the user’s computer and the tunnel server is the tunnel end point that acts as a client

Page 37: Virtual Private Network (VPN) © N. Ganesan, Ph.D

The Choice

• Voluntary tunneling is used in most applications

Page 38: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Other Important Protocols in VPN

• Microsoft Point-to-Point Encryption (MPPE)

• Extensible Authentication Protocol (EAP)

• Remote Authentication Dial-in User Service (RADIUS)

Page 39: Virtual Private Network (VPN) © N. Ganesan, Ph.D

A Note on RADIUS

Page 40: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Keys

• Symmetric Keys• Asymmetric Keys

Page 41: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Summary

Page 42: Virtual Private Network (VPN) © N. Ganesan, Ph.D
Page 43: Virtual Private Network (VPN) © N. Ganesan, Ph.D

End of Module

Page 44: Virtual Private Network (VPN) © N. Ganesan, Ph.D

VPN Scenarios

© N. Ganesan, Ph.D.

Page 45: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Chapter Objectives

Page 46: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Chapter Modules

Page 47: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Reference

Page 48: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Some Example Scenarios

• VPN remote access for employees. • On-demand branch office access. • Persistent branch office access. • Extranet for business partners. • Dial-up and VPNs with RADIUS

authentication

Page 49: Virtual Private Network (VPN) © N. Ganesan, Ph.D

VPN Remote Access for Employees

Page 50: Virtual Private Network (VPN) © N. Ganesan, Ph.D

VPN Remote Access for Employees

Page 51: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Router-to-Router Branch Office Connection

Page 52: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Branch Office Connection (Router-to-Router)

Page 53: Virtual Private Network (VPN) © N. Ganesan, Ph.D

VPN Based Extranet

Page 54: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Dial-up and VPNS with RADIUS Authentication

Page 55: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Module

Configuring a VPN Environment

Page 56: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Test Scenario

Page 57: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Component Details

• A computer running Windows Server 2003, Enterprise Edition, named DC1 that is acting as a domain controller, a Domain Name System (DNS) server, a Dynamic Host Configuration Protocol (DHCP) server, and a certification authority (CA).

• A computer running Windows Server 2003, Standard Edition, named VPN1 that is acting as a VPN server. VPN1 has two network adapters installed.

• A computer running Windows Server 2003, Standard Edition, named IAS1 that is acting as a Remote Authentication Dial-in User Service (RADIUS) server.

Page 58: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Component Details Cont.

• A computer running Windows Server 2003, Standard Edition, named IIS1 that is acting as a Web and file server.

• A computer running Windows XP Professional named CLIENT1 that is acting as a VPN client.

Page 59: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Private and Public Networks

• Private – 172.16.0.0/24

• Simulated Public– 10.0.0.0/24

Page 60: Virtual Private Network (VPN) © N. Ganesan, Ph.D

DC1

• DC1 is a computer running Windows Server 2003, Enterprise Edition that is providing the following services:– •A domain controller for the example.com

Active Directory domain– .•A DNS server for the example.com DNS

domain.– •A DHCP server for the intranet network

segment– •The enterprise root certification authority

(CA) for the example.com domain.

Page 61: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Step 1: Configuring DC1

• The first step is to configure the following– Active Directory– DNS– DHCP– CA

Page 62: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Step 2: Configure IAS1

• Install Windows Server – Provides RADIUS authentication,

authorization, and accounting for VPN1

• Register server in active directory• Configure new remote access policies • Specify authentication method and

encryption level

Page 63: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Step 3: Configure IIS1

• Configure this as a web server for web access as well as file sharing

Page 64: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Step 4: Configure VPN1

• Install VPN1 as a member server in the domain

• Configure TCP/IP for the Intranet and Internet sides

• Configure and enable routing and remote access

• Setup the server to work with a RADIUS server

• Setup the DHCP relay agent parameters

Page 65: Virtual Private Network (VPN) © N. Ganesan, Ph.D

Step 5: Configure Client1

• CLIENT1 is a computer running Windows XP Professional that is acting as a VPN client and gaining remote access to intranet resources across the simulated Internet. To configure CLIENT1 as a VPN client for a PPTP connection, perform the following steps:

Page 66: Virtual Private Network (VPN) © N. Ganesan, Ph.D

• 1.Connect CLIENT1 to the intranet network segment.

• 2.On CLIENT1, install Windows XP Professional as a member computer named CLIENT1 of the example.com domain.

• 3.Add the VPNUser account in the example.com domain to the local Administrators group.

• 4.Log off and then log on using the VPNUser account in the example.com domain.

Page 67: Virtual Private Network (VPN) © N. Ganesan, Ph.D

• 5.From Control Panel-Network Connections, obtain properties on the Local Area Network connection, and then obtain properties on the Internet Protocol (TCP/IP).

• 6.Click the Alternate Configuration tab, and then click User configured.

• 7.In IP address, type 10.0.0.1. In Subnet mask, type 255.255.255.0. This is shown in the following figure.

Page 68: Virtual Private Network (VPN) © N. Ganesan, Ph.D
Page 69: Virtual Private Network (VPN) © N. Ganesan, Ph.D

• 8.Click OK to save changes to the Internet Protocol (TCP/IP). Click OK to save changes to the Local Area Network connection.

• 9.Shut down the CLIENT1 computer.• 10.Disconnect the CLIENT1 computer

from the intranet network segment, and connect it to the simulated Internet network segment.

Page 70: Virtual Private Network (VPN) © N. Ganesan, Ph.D

• 11.Restart the CLIENT1 computer and log on using the VPNUser account.

• 12.On CLIENT1, open the Network Connections folder from Control Panel.

• 13.In Network Tasks, click Create a new connection.

• 14.On the Welcome to the New Connection Wizard page of the New Connection Wizard, click Next.

• 15.On the Network Connection Type page, click Connect to the network at my workplace. This is shown in the following figure.

Page 71: Virtual Private Network (VPN) © N. Ganesan, Ph.D
Page 72: Virtual Private Network (VPN) © N. Ganesan, Ph.D
Page 73: Virtual Private Network (VPN) © N. Ganesan, Ph.D
Page 74: Virtual Private Network (VPN) © N. Ganesan, Ph.D
Page 75: Virtual Private Network (VPN) © N. Ganesan, Ph.D

• 19.Click Next. On the Connection Availability page, click Next.

• 20.On the Completing the New Connection Wizard page, click Finish. The Connect PPTPtoCorpnet dialog box is displayed. This is shown in the following figure.

Page 76: Virtual Private Network (VPN) © N. Ganesan, Ph.D
Page 77: Virtual Private Network (VPN) © N. Ganesan, Ph.D

• 21.Click Properties, and then click the Networking tab.

• 22.On the Networking tab, in Type of VPN, click PPTP VPN. This is shown in the following figure

Page 78: Virtual Private Network (VPN) © N. Ganesan, Ph.D
Page 79: Virtual Private Network (VPN) © N. Ganesan, Ph.D

• 23.Click OK to save changes to the PPTPtoCorpnet connection. The Connect PPTPtoCorpnet dialog box is displayed.

• 24.In User name, type example/VPNUser. In Password, type the password you chose for the VPNUser account. This is shown in the following figure.

Page 80: Virtual Private Network (VPN) © N. Ganesan, Ph.D
Page 81: Virtual Private Network (VPN) © N. Ganesan, Ph.D

• 25.Click Connect.• 26.When the connection is complete, run

Internet Explorer.• 27.If prompted by the Internet Connection

Wizard, configure it for a LAN connection. In Address, type http://IIS1.example.com/winxp.gif. You should see a Windows XP graphic.

• 28.Click Start, click Run, type \\IIS1\ROOT, and then click OK. You should see the contents of the Local Drive (C:) on IIS1.

• 29.Right-click the PPTPtoCorpnet connection, and then click Disconnect.

Page 82: Virtual Private Network (VPN) © N. Ganesan, Ph.D

End of Chapter