660 likes | 674 Views
Network Security 2. Module 3: VPN and Encryption Technology. Module 3: VPN and Encryption Technology. Lesson 3.3 Implementing Digital Certificates. Certificate authority support. Certificate authority support. Restrictions
E N D
Network Security 2 Module 3: VPN and Encryption Technology
Module 3: VPN and Encryption Technology Lesson 3.3 Implementing Digital Certificates
Certificate authority support • Restrictions • CA should be configured only when both IPSec and ISAKMP are configured in the network. • Cisco IOS does not support CA server public keys greater than 2048 bits. • Prerequisites • A CA must be available to the network • CA must support Simple Certificate Enrollment Protocol (SCEP)
The protocol is designed to make the issuing and revocation of digital certificates as scalable as possible. • The idea is that any standard network user should be able to request their digital certificate electronically and as simply as possible. • These processes have usually required intensive input from network administrators, and so have not been suited to large scale deployments. • Two authentication methods that SCEP provides are manual authentication and authentication based on pre-shared secret keys. Simple Certificate Enrollment Protocol SCEP
Module 3: VPN and Encryption Technology Lesson 3.4 VPN Topologies
VPNs • A VPN provides the same network connectivity for remote users over a public infrastructure as they would have over a private network. • VPN services for network connectivity include authentication, data integrity, and confidentiality. • Two basic VPN types: • LAN-to-LAN (Site to Site) VPNs • Intranet VPNs. • Extranet VPNs • Remote Access VPNs • Connect remote users, such as mobile users and telecommuters, to the enterprise.
Remote access VPNs • There two types of Remote Access VPNs: • Client-initiated – Remote users use a VPN client or web browser to establish a secure tunnel across a public network to the enterprise. • NAS-initiated – Remote users dial in to an ISP Network Access Server (NAS). The NAS establishes a secure tunnel to the enterprise private network that might support multiple remote user-initiated sessions.
Module 3: VPN and Encryption Technology Lesson 3.5 VPN Technologies
VPN technology options • With implementation of encryption on one layer, this layer and all layers above it are automatically protected. • Network layer protection offers one of the most flexible solutions. • It is media independent as well as application independent.
WebVPN • Lets users establish a secure, remote-access VPN tunnel to a head-end device using a web browser. • Not a replacement for IPSec, but widens application availability. • No need for either a software or hardware client. • Provides easy access to a broad range of enterprise applications, • WebVPN uses the SSL protocol and its successor, TLS
Tunneling Protocols L2TP • Cisco used Layer 2 Forwarding (L2F) as its proprietary tunneling protocol. • L2TP is entirely backwards compatible with L2F. L2F is not forward compatible with L2TP. • L2TP, is a combination of Cisco L2F and Microsoft Point-to-Point Tunneling Protocol (PPTP). • Microsoft supports PPTP in its earlier versions of Windows and PPTP/L2TP in Windows NT/2000/XP. • L2TP allows users to invoke corporate security policies across any VPN link as an extension of their internal networks. • L2TP is best suited for remote access VPNs that require multiprotocol support.
Tunneling Protocols GRE • Cisco GRE multiprotocol carrier encapsulates IP, CLNP, IPX, AppleTalk, DECnet Phase IV, and XNS inside IP tunnels. • Creates a virtual point-to-point link between routers across an IP cloud. • GRE is best suited for site-to-site VPNs that require multiprotocol support. • GRE is typically used to tunnel multicast packets such as routing protocols.
Tunneling Protocols IPSEC • Is the choice for secure corporate VPNs. • Supports IP unicast traffic only. • For multiprotocol or IP multicast tunneling, another tunneling protocol must be used. • Neither L2TP or GRE supports data encryption or packet integrity. • IPSec can be used in combination to provide encryption, such as L2TP/IPSec and GRE/IPSec. • If only IP unicast packets are tunneled, simple encapsulation provided by IPSec is sufficient.
Tunneling Protocols MPLS • MPLS is a VPN technology. • Implemented by ISPs and large corporations. • Uses label switching and label switched paths over various link level technologies. • Packet-over-SONET • Frame Relay • ATM • LAN technologies • Includes procedures and protocols for the distribution of labels between routers, encapsulations, and multicast considerations.
Tunneling Interfaces • Provide a point-to-point connection between two routers through a virtual software interface. • Appear as one direct link between routers hiding the underlying infrastructure • Should not to be confused with IPSec or L2TP tunnels, which can act as tunnels but not as true Cisco IOS interfaces.
Module 3: VPN and Encryption Technology Lesson 3.6 IPSec
Internet What Is IPsec? IPsec • IPsec is the IETF standard that enables encrypted communication between peers. • Consists of open standards for securing private communications • Ensures data confidentiality, integrity, and authentication through network layer encryption • Scales from small to very large networks
Options for IPSec framework • AH and ESP use symmetric secret key algorithms, although public key algorithms are feasible • The IPSec framework provides data integrity, authentication, and confidentiality, as well as security association and key management
Authentication Header (AH) • Used to provide connectionless integrity and data origin authentication for IP datagrams, and to provide protection against replays. • Provides authentication for as much of the IP header as possible, as well as for upper level protocol data. • AH is defined as IP protocol 51. • May be applied alone, in combination with the IP ESP, or in a nested fashion through the use of tunnel mode. • ESP may be used to provide the same security services, and it also provides a confidentiality, or encryption, service. • The primary difference between the authentication services provided by ESP and AH is the extent of the coverage. • ESP does not protect any IP header fields unless ESP encapsulates those fields, or the fields are in tunnel mode .
AH Header Fields • The following are reasons to use AH even though ESP seems to do all the security services. • Requires less overhead than ESP. • Is never export-restricted. • Is mandatory for IPv6 compliance.
Encapsulating Security Payload (ESP) • Used to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service • Confidentiality may be selected independent of all other services. • However, use of confidentiality without integrity authentication, either in ESP or separately in AH, may subject traffic to certain forms of active attacks • ESP is defined as IP protocol 50.
Encapsulating Security Payload (ESP) • Data origin authentication and connectionless integrity are joint services • Offered as an option in conjunction with optional confidentiality. • The anti-replay service may be selected only if data origin authentication is selected. • Its election is solely at the discretion of the receiver. • Anti-replay service is effective only if the receiver checks the sequence number. • Traffic flow confidentiality requires selection of tunnel mode. • Although both confidentiality and authentication are optional, at least one of them must be selected.
Encapsulating Security Payload (ESP) • One of the most important values is the Security Parameters Index (SPI) • Keep track to the current SA between two IPSec devices. • Encryption is done with DES or 3DES. • Optional authentication and integrity are provided with HMAC, keyed SHA-1, or keyed MD5 • There are two different key types contained in the SA : • Encryption session keys • HMAC session keys
Tunnel and transport modes • Transport mode • Each end host does IPSec encapsulation of its own data, host-to-host. • Tunnel mode • IPSec gateways provide IPSec services to other hosts in peer-to-peer tunnels. • End-hosts are not aware of IPSec being used
Tunnel and transport modes • ESP and AH can be applied to IP packets in transport mode and tunnel mode. • In transport mode, • Security is provided only for the transport layer and above. • Protects the payload of the packet but leaves the original IP address in the clear. • Original IP address is used to route the packet through the Internet. • Tunnel mode • Provides security for the whole original IP packet. • Original IP packet is encrypted. • Encrypted packet is encapsulated in another IP packet.