Remote Access VPN

advertisement
Virtual Private
Networks
Ba 378 Winter 2006
What is a VPN?
• A VPN is a private network linked to a public
network, using the internet as its transfer
mechanism. It also attempts to maintain
security during transfer of information
• The most common configuration is to have a
single main internal network with remote nodes
using VPN to gain full access to the central net.
• The remote nodes are commonly remote
offices or employees working from home. You
can also link two small (or large) networks to
form an even larger single network.
http://www.tldp.org/HOWTO/VPN-HOWTO/x192.html
VPNs as islands
• VPNs work like islands
• The ocean can be seen as the internet
• To get to each island a bridge must be built,
even though it may be costly at first hand. It is
beneficial in the end. (Leased Lines)
• Submarines are given to each person who attain
a leased line.
• Each remote member can communicate in a
safe and reliable manner .
http://www.alliancedatacom.com/how-vpn-works.asp
TYPES OF VPN’S
2 Common Types
 Remote Access VPN
 Site to Site VPN
- Intranet VPN
- Extranet VPN
Remote Access VPN
What is it?
• “Virtual Private dial-up network”
• User to LAN connection
• Enables employees to connect to private
network from remote locations
http://computer.howstuffworks.com/vpn2.htm
Remote Access VPN
How does it work?
• Company out sources to an enterprise service
provider (ESP)
• ESP sets up a network access server (NAS)
• Telecommuters receive desktop client
software for computer
• Employees dial toll free number on computer
to connect to NAS and use client software to
tap into company network
http://computer.howstuffworks.com/vpn2.htm
Site to Site VPN
What is it and How does it work?
 Intranet-based
- One or more remote locations connect to a single private
network
-Connects LAN to LAN
 Extranet-based
-Close relationship with another company
-Connects LAN to LAN
-Various companies can work in shared environment
http://computer.howstuffworks.com/vpn3.htm
3 VPN TYPES
http://computer.howstuffworks.com/vpn2.htm
VPN Security
With VPN now expanding not only
through businesses but through
out the globe and connecting
several businesses together
through LANs, WANs, and
Wireless networks, security is
more important than ever
Integrated Security Systems
•
•
•
•
An integrated system provides greater risk
reduction than any individual product or
combination security devices, regardless of
features or performance. Using the network
to provide a common security architecture:
reduces complexity
enables tighter integration
closes risk gaps
provides greater visibility of end-to-end
security
http://www.cisco.com/en/US/products/hw/vpndevc/products_category_technologies_overview.html
Well designed VPNs incorporate the
following characteristics:
• Integrated: Every element of the network acts as a point
of defense including software and hardware
• Collaborative: Various network components work
together to provide a means of protection. Security
involves cooperation between endpoints, network
elements, and policy enforcement
• Adaptive: The system can recognize new threats as the
arrive. Mutual awareness can exist among and between
security services and network intelligence, thus
increasing security effectiveness to new threats.
http://www.cisco.com/en/US/products/hw/vpndevc/products_category_technologies_overview.html
VPN Security Methods
A well designed VPN uses several methods
for keeping the connection and data secure,
these are some of them:
• Firewalls
• Encryption
• IPSec
• AAA Servers
http://computer.howstuffworks.com/vpn.htm
Firewall
“A firewall is simply a program or
hardware device that filters the
information coming through the
Internet connection into your private
network or computer system. If an
incoming packet of information is
flagged by the filters, it is not allowed
through.”
http://computer.howstuffworks.com/vpn.htm
Firewall
Firewalls are an important part of the
security system because they will help
stop hackers, viruses, spyware, and other
harmful things that are associated with the
internet from entering the company’s
computer system.
http://computer.howstuffworks.com/vpn.htm
Encryption
“Encryption is the process of taking all the
data that one computer is sending to
another and encoding it into a form that
only the other computer will be able to
decode.” Most computer systems use
one of the following:
• Symmetric-key encryption
• Public-key encryption
http://computer.howstuffworks.com/vpn.htm
Symmetric-key encryption
• Each computer has a secret key that it can use to
encrypt information before it is sent over the network to
another computer
• Symmetric-key requires that you know which
computers will be talking to each other so you can
install the key on each one
• Symmetric-key encryption is essentially the same as a
secret code that each of the two computers must know
in order to decode the information. The code provides
the key to decoding the message.
http://computer.howstuffworks.com/vpn.htm
Example
• “You create a coded message to send to a friend in
which each letter is substituted with the letter that is two
down from it in the alphabet. So "A" becomes "C," and
"B" becomes "D". You have already told a trusted friend
that the code is "Shift by 2". Your friend gets the
message and decodes it. Anyone else who sees the
message will see only nonsense.”
http://computer.howstuffworks.com/vpn.htm
Public-key encryption
• This encryption uses a combination of a private key and a
public key
• The private key is known only to your computer, while the
public key is given by your computer to any computer that
wants to communicate securely with it
• To decode an encrypted message, a computer must use the
public key, provided by the originating computer, and its own
private key
http://computer.howstuffworks.com/vpn.htm
Public-key encryption
• The most popular public-key encryption is
called Pretty Good Privacy (PGP)
• This program lets you encrypt just about
anything. ie email, hard drives, media,
etc.
• For more information PGP
http://computer.howstuffworks.com/vpn.htm
IPSec
• IPSec stands for Internet Protocol Security
Protocol
• It provides enhanced security features such
as better encryption algorithms and more
comprehensive authentication
• There are two types of encryption: tunneling
and transport
http://computer.howstuffworks.com/vpn.htm
Tunneling and transporting
•
Tunneling encryption encrypts each
packet that is sent
• Transport encryption encrypts the entire
package as a whole that is sent
http://computer.howstuffworks.com/vpn.htm
Overview of a VPN and its security points
Photo courtesy Cisco Systems, Inc.
A remote-access VPN utilizing IPSec
http://computer.howstuffworks.com/vpn.htm
AAA Servers
• AAA stands for authentication, authorization
and accounting
• These servers are used for a more secure
access for remote-access VPN
environments
http://computer.howstuffworks.com/vpn.htm
AAA Servers
• When a AAA server gets a request to
establish a session, it asks the following
questions:
• Who you are (authentication)?
• What you are allowed to do (authorization)?
• What you actually do (accounting)?
http://computer.howstuffworks.com/vpn.htm
Who uses VPNs?
• Companies and organizations
– Employees work at home or traveling
• Retail sector
– Usually have multiple sites
• Universities
– Allow students and faculty to access
information off site
Providers of VPNs
• Company can build own
– Purchase software
– Use of a router
• Can outsource
– Mostly internet service providers (ISPs) and
interexchange carriers (IXCs)
– Less managing and logistics involved
http://compnetworking.about.com/gi/dynamic/offsite.htm?site=http%3A%2F%2Fwww.informationweek.com%2F780%
2Fvpn.htm
http://www.techsoup.org/howto/articles/networks/page1352.cfm?cg=searchterms&sg=Virtual%20Private%20Network
How much does VPNs cost?
• Prices vary by each provider
• Additional options available such as network
management, user authentication, firewalls,
encryption
• Savings
– Infonetics reports $1,000 average savings per
remote worker per year
– Cisco’s study states savings of $600 to $1,800 per
remote worker per year.
http://www.bcr.com/architecture/remote_access/do-it-yourself_vpns_20020519302.htm
Pros and Cons of VPNs
Price Vs. Added-Value
• Added-Value
–
–
–
–
•
Efficiency
Security
Geographic Distance
Satisfaction
Poor Maintenance
Added-Value
35
30
25
20
VPN
15
No VPN
10
5
0
1
2
3
4
5
6
Components of a good VPN
A Good VPN Should…
Security
It must offer security to the users while accessing their data.
Maintenance
It should be updated and maintained within the means of the company.
Efficiency
The VPN needs to add to the productivity and quality of the company.
Reliability
It should be a network that can be counted-on.
Price
Breadth
The benefits must outweigh the costs of the VPN.
Alignment
The VPN must enhance and compliment the goals of the company.
It should span far enough to meet the needs of the company.
Download