尊敬的 微信汇率:1円 ≈ 0.046166 元 支付宝汇率:1円 ≈ 0.046257元 [退出登录]
SlideShare a Scribd company logo
VPNVPN
Copyright by Hacking Feder
Powered by LJ Projects
WHY VPN?
• Geographically separate offices need to
communicate.
• Collaboration
• Mobile users
• One Network
•
TRADITIONAL CONNECTIVITY
VPN
• Allows a trusted network to communicate
to another trusted network over un-trusted
public network.
• Used to extend an enterprise’s internal
private network.
VPN
•Definition:
Network of virtual circuits that carries
private traffic through public or shared
networks such as the Internet or those
provided by network service providers.
VPN
VPN-BENEFITS
• Extends geographical connectivity,
• Improves Security
• Reduces operational costs versus a
traditional WAN
•Improves productivity.
VPN-BENEFITS
• Simplifies network topology.
• Provides global networking opportunities.
• Reduces transit time and transportation
costs for remote users.
VPN-CHARACTERISTICS
• Traffic is encrypted
• Remote site is authenticated
• Multiple protocol support,
• Connection is point to point.
TUNNELLING
Tunnel – a means of forwarding data
across a network from one node to another,
as if two nodes were directly connected.
How it is achieved?
Encapsulation / Encapsulating the Data
Encrypted Inner Datagram
Datagram Header Outer Datagram Data Area
Original Datagram
TUNNELLING
ENCAPSULATION
• Extra header is added to the data sent
by the transmitting end of the tunnel.
• Data is forwarded by intermediate
nodes based on the outer header
without looking at the contents of the
original packet.
ENCAPSULATION
So technically…
VPN is a group of one or more secure
IP tunnel.
FOUR CRITICAL FUNCTIONS
Authentication – validates that the data
was sent from the sender.
Access control – limiting unauthorized
users from accessing the network.
Confidentiality – preventing the data to
be read or copied as the data is being
transported.
Data Integrity – ensuring that the data
has not been altered
VPN PROTOCOLS
PPTP - Point-to-Point Tunneling Protocol
L2TP - Layer 2 Tunneling Protocol
IPsec - Internet Protocol Security
SOCKS - is not used as much as the ones
above
VPN ENCAPSULATION
TYPES OF VPN
• Trusted VPN
• Secure VPN
• Hybrid VPN
REQUIREMENTS – SECURE VPN
• All traffic on the secure VPN must be
encrypted and authenticated.
• The security property of the VPN must be
agreed to by all parties in the VPN.
• No one outside the VPN can affect the
security property of the VPN.
REQUIREMENTS – TRUSTED VPN
• No one other than the trusted VPN provider
can affect the creation or modification of a
path in the VPN.
•No one other than the trusted VPN provider
can change data, inject data, or delete data
on a path in the VPN.
REQUIREMENTS – TRUSTED VPN
•The routing and addressing used in a trusted
VPN must be established before the VPN is
created.
REQUIREMENTS – HYBRID VPN
• The address boundaries of the secure VPN
within the trusted VPN must be extremely
clear.
• The admin should be able to say which one
is secure VPN, when there is a Hybrid VPN
setup.
TECHNOLOGIES SUPPORTED – SVPN
• IPSec with Encryption
• Either tunnel or transport modes.
• Security association can be set up either
manually or using IKE with either
certificates or pre-shared secrets.
• IPSec inside of L2TP
•SSL 3.0 or TLS with encryption.
•TLS – RFC 3193
IPSec RFC
• IKEv1
• 2401, 2406, 2407, and 2409
•IKEv2
• 4301, 4303, 4306, 4307, and 4308
TECHNOLOGIES SUPPORTED – TVPN
• Mainly classified into:
• Layer 2 VPN, and
• Layer 3 VPN
TECHNOLOGIES SUPPORTED – TVPN
• Layer 2 VPN
• ATM Circuits
• Frame Relay Circuits, and
• Transport of Layer 2 frames over MPLS.
TECHNOLOGIES SUPPORTED – TVPN
• Layer 3 VPN
• MPLS with constrained distribution of
routing information through BGP. (RFC
4364).
TECHNOLOGIES SUPPORTED – HVPN
• Any supported secure VPN technologies
running over any supported trusted VPN
technology.
VPN IN LINUX
• IPSec –
• Standard developed by International
Engineering Task Force – IETF
• Linux includes IPSec support – Linux 2.6
kernel.
• Offer administrative interface – ipsec-
tools
VPN IN LINUX
•PPP over OpenSSH
• Method & not a tool.
• With the existing tools, you can configure
a PPP interface to use SSH to encrypt all
data that goes across the PPP interface.
• Poor performance when compared to
other.
VPN IN LINUX
•OpenVPN
• www.openvpn.net
• Can create a tunnel to remote systems
over public networks with encryption and
authentication features.
• yum install openvpn
VPN IN LINUX
• openswan
• www.openswan.org
• An implementation of IPSec that was
originally based on code from the
FreeS/WAN project. (www.freeswan.org).
• yum install openswan
VPN IN LINUX
• Crypto IP Encapsulation (CIPE)
• IP Packets are routed across selected IP
interfaces as encrypted UDP packets.
• Easy to setup
• Less overhead than PPP over OpenSSH
• Means better performance.
• Drawback – Since not a standard
implementation, not available on all distro
UNDERSTANDING IPSec
•IPSec consists of two primary protocols:
• Authentication Header (AH)
• Encapsulating Security Payload (ESP)
UNDERSTANDING IPSec
/etc/protocols
•AH = 51
•ESP = 50
UNDERSTANDING IPSec
•IPSec Mode
•Tunnel Mode
•Transport Mode
UNDERSTANDING IPSec
Tunnel Mode
•Entire IP datagram is encapsulated into
the new IP datagram by IPSec.
•Protects both data and the control
information.
UNDERSTANDING IPSec
Transport Mode
• Only the data (payload) is encrypted.
• To do this, IPSec inserts its own header
between the IP header and the protocol
header for the upper layer.
UNDERSTANDING IPSec
Transport Mode
AH
IP Header -> AH Header -> TCP Header + Payload
ESP
IP Header -> ESP -> TCP HEader + Payload
=================================================
Tunnel Mode
AH
IP Header -> AH Header -> Original IP Header -> TCP Header + Payload
ESP
IP Header -> ESP -> IP Header + TCP Header + Payload
UNDERSTANDING IPSec
AH-Tunnel
UNDERSTANDING IPSec
UNDERSTANDING IPSec
UNDERSTANDING IPSec
UNDERSTANDING IPSec
•Review – Features of VPN
• Authentication,
• Encryption
•For authentication and exchange of
symmetric keys, IPSec uses the Internet Key
Exchange – IKE protocol.
UNDERSTANDING IPSec
•At the beginning of communication, IKE:
•Authenticates the peer computer,
•Negotiates security associations,
•Choose secret symmetric keys (using
Diffie Hellmann key exchange)
UNDERSTANDING IPSec
• Result/
•Security Association - SA
•The SA made is stored in Security
Association Database – SAD.
UNDERSTANDING IPSec
• SA consists of:
• information about the communications
endpoints – eg public IP address.
• whether AH or ESP are being used with
IPSec, and
• The secret key / algorithm being used.
UNDERSTANDING IPSec
•HMAC – Hash Message Authentication
Codes
• Send through the Protocol Header
• Message Authentication Code
• Calculated using a specific algorithm
involving cryptographic hash function in
combination with a secret key.
UNDERSTANDING IPSec
HMAC offers the following advantages:
• Data Integrity –
The HMAC created using the hash
algorithm, secret key and data in the IP
datagram can be checked at the receiver
end by reversing the order.
• Data privacy
Datagrams are encrypted using symmetric
encryption algorithms.
IPSec – DoS Attack
• Recording and replaying sequence of
packets can cause denial of service attacks.
• IPSec combats this type of attacks
• Accepts only packets that are within a
“sliding window” of sequence numbers or
higher.
• Packets using older sequence numbers are
dropped.
VPN Theory

More Related Content

What's hot

Vpn
VpnVpn
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
HASHIR RAZA
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
Abduhalim Beknazarov
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Osp Dev
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "
Muhammad Usman
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Richa Singh
 
VPN
VPNVPN
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
Nikhil Kumar
 
VPN Virtual Private Network
VPN Virtual Private NetworkVPN Virtual Private Network
VPN Virtual Private Network
Rama Krishna Nakka
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
Peter R. Egli
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)
Devolutions
 
Cisco Router As A Vpn Server
Cisco Router As A Vpn ServerCisco Router As A Vpn Server
Cisco Router As A Vpn Server
mmoizuddin
 
Virtual private network
Virtual private network Virtual private network
Virtual private network
Parth Akbari
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
qaisar17
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
stolentears
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
Netwax Lab
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
ashishrocks23
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
Ram Bharosh Raut
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
Avinash Nath
 
Design of a Virtual Private Network
Design of a Virtual Private NetworkDesign of a Virtual Private Network
Design of a Virtual Private Network
Shubhayu Roy
 

What's hot (20)

Vpn
VpnVpn
Vpn
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn-Virtual Private Network
Vpn-Virtual Private NetworkVpn-Virtual Private Network
Vpn-Virtual Private Network
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn " Virtual Private Network "
Vpn " Virtual Private Network "Vpn " Virtual Private Network "
Vpn " Virtual Private Network "
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
VPN
VPNVPN
VPN
 
Virtual Private Network- VPN
Virtual Private Network- VPNVirtual Private Network- VPN
Virtual Private Network- VPN
 
VPN Virtual Private Network
VPN Virtual Private NetworkVPN Virtual Private Network
VPN Virtual Private Network
 
VPN - Virtual Private Network
VPN - Virtual Private NetworkVPN - Virtual Private Network
VPN - Virtual Private Network
 
Virtual Private Network (VPN)
Virtual Private Network (VPN)Virtual Private Network (VPN)
Virtual Private Network (VPN)
 
Cisco Router As A Vpn Server
Cisco Router As A Vpn ServerCisco Router As A Vpn Server
Cisco Router As A Vpn Server
 
Virtual private network
Virtual private network Virtual private network
Virtual private network
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
VPN (virtual private network)
VPN (virtual private network) VPN (virtual private network)
VPN (virtual private network)
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
Design of a Virtual Private Network
Design of a Virtual Private NetworkDesign of a Virtual Private Network
Design of a Virtual Private Network
 

Similar to VPN Theory

Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networks
primeteacher32
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
Greater Noida Institute Of Technology
 
Vp ns
Vp nsVp ns
IP security and VPN presentation
IP security and VPN presentation IP security and VPN presentation
IP security and VPN presentation
KishoreTs3
 
7256 ccna security_chapter_8_vpn_dl3_oz_20130409031455
7256 ccna security_chapter_8_vpn_dl3_oz_201304090314557256 ccna security_chapter_8_vpn_dl3_oz_20130409031455
7256 ccna security_chapter_8_vpn_dl3_oz_20130409031455
ytrui
 
IP Protocol Security
IP Protocol SecurityIP Protocol Security
IP Protocol Security
David Barker
 
Module 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptxModule 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptx
AliMohamed855266
 
CCNP Security-VPN
CCNP Security-VPNCCNP Security-VPN
CCNP Security-VPN
mohannadalhanahnah
 
Vpnppt1884
Vpnppt1884Vpnppt1884
Vpnppt1884
Nisha Qazi
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security Presentation
Wajahat Rajab
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
sonangrai
 
08. networking-part-2
08. networking-part-208. networking-part-2
08. networking-part-2
Muhammad Ahad
 
Unit08
Unit08Unit08
ENSA_Module_8.pptx
ENSA_Module_8.pptxENSA_Module_8.pptx
ENSA_Module_8.pptx
SkyBlue659156
 
Ns lecture4: Introduction to Virtual Network Protocol(VPN) and Internet Proto...
Ns lecture4: Introduction to Virtual Network Protocol(VPN) and Internet Proto...Ns lecture4: Introduction to Virtual Network Protocol(VPN) and Internet Proto...
Ns lecture4: Introduction to Virtual Network Protocol(VPN) and Internet Proto...
Aksum Institute of Technology(AIT, @Letsgo)
 
VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALL
Moin Islam
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
Shradha Maheshwari
 
Vp ns
Vp nsVp ns
VPN
VPNVPN
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
@zenafaris91
 

Similar to VPN Theory (20)

Virtual Private Networks
Virtual Private NetworksVirtual Private Networks
Virtual Private Networks
 
Virtual Private Network
Virtual Private NetworkVirtual Private Network
Virtual Private Network
 
Vp ns
Vp nsVp ns
Vp ns
 
IP security and VPN presentation
IP security and VPN presentation IP security and VPN presentation
IP security and VPN presentation
 
7256 ccna security_chapter_8_vpn_dl3_oz_20130409031455
7256 ccna security_chapter_8_vpn_dl3_oz_201304090314557256 ccna security_chapter_8_vpn_dl3_oz_20130409031455
7256 ccna security_chapter_8_vpn_dl3_oz_20130409031455
 
IP Protocol Security
IP Protocol SecurityIP Protocol Security
IP Protocol Security
 
Module 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptxModule 8 - Ccna - Pre.pptx
Module 8 - Ccna - Pre.pptx
 
CCNP Security-VPN
CCNP Security-VPNCCNP Security-VPN
CCNP Security-VPN
 
Vpnppt1884
Vpnppt1884Vpnppt1884
Vpnppt1884
 
Telecommunications and Network Security Presentation
Telecommunications and Network Security PresentationTelecommunications and Network Security Presentation
Telecommunications and Network Security Presentation
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
 
08. networking-part-2
08. networking-part-208. networking-part-2
08. networking-part-2
 
Unit08
Unit08Unit08
Unit08
 
ENSA_Module_8.pptx
ENSA_Module_8.pptxENSA_Module_8.pptx
ENSA_Module_8.pptx
 
Ns lecture4: Introduction to Virtual Network Protocol(VPN) and Internet Proto...
Ns lecture4: Introduction to Virtual Network Protocol(VPN) and Internet Proto...Ns lecture4: Introduction to Virtual Network Protocol(VPN) and Internet Proto...
Ns lecture4: Introduction to Virtual Network Protocol(VPN) and Internet Proto...
 
VPN & FIREWALL
VPN & FIREWALLVPN & FIREWALL
VPN & FIREWALL
 
Shradhamaheshwari vpn
Shradhamaheshwari vpnShradhamaheshwari vpn
Shradhamaheshwari vpn
 
Vp ns
Vp nsVp ns
Vp ns
 
VPN
VPNVPN
VPN
 
WLAN:VPN Security
WLAN:VPN SecurityWLAN:VPN Security
WLAN:VPN Security
 

More from LJ PROJECTS

Tips on looking after yourself | Managing COVID-19 Stress | LJ Projects
Tips on looking after yourself | Managing COVID-19 Stress | LJ ProjectsTips on looking after yourself | Managing COVID-19 Stress | LJ Projects
Tips on looking after yourself | Managing COVID-19 Stress | LJ Projects
LJ PROJECTS
 
LJ Innovation village 2019 - Uploaded by LJ Projects
LJ Innovation village 2019 - Uploaded by LJ ProjectsLJ Innovation village 2019 - Uploaded by LJ Projects
LJ Innovation village 2019 - Uploaded by LJ Projects
LJ PROJECTS
 
Cloudedots - Ideas into Reality | Mobile and Web App development Company
Cloudedots - Ideas into Reality | Mobile and Web App development CompanyCloudedots - Ideas into Reality | Mobile and Web App development Company
Cloudedots - Ideas into Reality | Mobile and Web App development Company
LJ PROJECTS
 
Foodies- An e-Food inventory Management Portal
Foodies- An e-Food inventory Management PortalFoodies- An e-Food inventory Management Portal
Foodies- An e-Food inventory Management Portal
LJ PROJECTS
 
Security models
Security models Security models
Security models
LJ PROJECTS
 
Information security
Information securityInformation security
Information security
LJ PROJECTS
 
Grid Computing (An Up-Coming Technology)
Grid Computing (An Up-Coming Technology)Grid Computing (An Up-Coming Technology)
Grid Computing (An Up-Coming Technology)
LJ PROJECTS
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
LJ PROJECTS
 
Socket Programming- Data Link Access
Socket Programming- Data Link AccessSocket Programming- Data Link Access
Socket Programming- Data Link Access
LJ PROJECTS
 
TCP/IP Introduction
TCP/IP Introduction TCP/IP Introduction
TCP/IP Introduction
LJ PROJECTS
 
Event Management System Document
Event Management System Document Event Management System Document
Event Management System Document
LJ PROJECTS
 

More from LJ PROJECTS (11)

Tips on looking after yourself | Managing COVID-19 Stress | LJ Projects
Tips on looking after yourself | Managing COVID-19 Stress | LJ ProjectsTips on looking after yourself | Managing COVID-19 Stress | LJ Projects
Tips on looking after yourself | Managing COVID-19 Stress | LJ Projects
 
LJ Innovation village 2019 - Uploaded by LJ Projects
LJ Innovation village 2019 - Uploaded by LJ ProjectsLJ Innovation village 2019 - Uploaded by LJ Projects
LJ Innovation village 2019 - Uploaded by LJ Projects
 
Cloudedots - Ideas into Reality | Mobile and Web App development Company
Cloudedots - Ideas into Reality | Mobile and Web App development CompanyCloudedots - Ideas into Reality | Mobile and Web App development Company
Cloudedots - Ideas into Reality | Mobile and Web App development Company
 
Foodies- An e-Food inventory Management Portal
Foodies- An e-Food inventory Management PortalFoodies- An e-Food inventory Management Portal
Foodies- An e-Food inventory Management Portal
 
Security models
Security models Security models
Security models
 
Information security
Information securityInformation security
Information security
 
Grid Computing (An Up-Coming Technology)
Grid Computing (An Up-Coming Technology)Grid Computing (An Up-Coming Technology)
Grid Computing (An Up-Coming Technology)
 
Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)Computer Security and Intrusion Detection(IDS/IPS)
Computer Security and Intrusion Detection(IDS/IPS)
 
Socket Programming- Data Link Access
Socket Programming- Data Link AccessSocket Programming- Data Link Access
Socket Programming- Data Link Access
 
TCP/IP Introduction
TCP/IP Introduction TCP/IP Introduction
TCP/IP Introduction
 
Event Management System Document
Event Management System Document Event Management System Document
Event Management System Document
 

Recently uploaded

Erasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES CroatiaErasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES Croatia
whatchangedhowreflec
 
Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024
Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024
Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024
yarusun
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
TechSoup
 
The Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teachingThe Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teaching
Derek Wenmoth
 
How to stay relevant as a cyber professional: Skills, trends and career paths...
How to stay relevant as a cyber professional: Skills, trends and career paths...How to stay relevant as a cyber professional: Skills, trends and career paths...
How to stay relevant as a cyber professional: Skills, trends and career paths...
Infosec
 
Talking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual AidsTalking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual Aids
MattVassar1
 
managing Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptxmanaging Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptx
nabaegha
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Kalna College
 
Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024
khabri85
 
Diversity Quiz Finals by Quiz Club, IIT Kanpur
Diversity Quiz Finals by Quiz Club, IIT KanpurDiversity Quiz Finals by Quiz Club, IIT Kanpur
Diversity Quiz Finals by Quiz Club, IIT Kanpur
Quiz Club IIT Kanpur
 
How to Create User Notification in Odoo 17
How to Create User Notification in Odoo 17How to Create User Notification in Odoo 17
How to Create User Notification in Odoo 17
Celine George
 
Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17
Celine George
 
Creating Images and Videos through AI.pptx
Creating Images and Videos through AI.pptxCreating Images and Videos through AI.pptx
Creating Images and Videos through AI.pptx
Forum of Blended Learning
 
A Quiz on Drug Abuse Awareness by Quizzito
A Quiz on Drug Abuse Awareness by QuizzitoA Quiz on Drug Abuse Awareness by Quizzito
A Quiz on Drug Abuse Awareness by Quizzito
Quizzito The Quiz Society of Gargi College
 
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT KanpurDiversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Quiz Club IIT Kanpur
 
The Rise of the Digital Telecommunication Marketplace.pptx
The Rise of the Digital Telecommunication Marketplace.pptxThe Rise of the Digital Telecommunication Marketplace.pptx
The Rise of the Digital Telecommunication Marketplace.pptx
PriyaKumari928991
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
Kalna College
 
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
Kalna College
 
What are the new features in the Fleet Odoo 17
What are the new features in the Fleet Odoo 17What are the new features in the Fleet Odoo 17
What are the new features in the Fleet Odoo 17
Celine George
 
Keynote given on June 24 for MASSP at Grand Traverse City
Keynote given on June 24 for MASSP at Grand Traverse CityKeynote given on June 24 for MASSP at Grand Traverse City
Keynote given on June 24 for MASSP at Grand Traverse City
PJ Caposey
 

Recently uploaded (20)

Erasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES CroatiaErasmus + DISSEMINATION ACTIVITIES Croatia
Erasmus + DISSEMINATION ACTIVITIES Croatia
 
Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024
Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024
Get Success with the Latest UiPath UIPATH-ADPV1 Exam Dumps (V11.02) 2024
 
Accounting for Restricted Grants When and How To Record Properly
Accounting for Restricted Grants  When and How To Record ProperlyAccounting for Restricted Grants  When and How To Record Properly
Accounting for Restricted Grants When and How To Record Properly
 
The Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teachingThe Science of Learning: implications for modern teaching
The Science of Learning: implications for modern teaching
 
How to stay relevant as a cyber professional: Skills, trends and career paths...
How to stay relevant as a cyber professional: Skills, trends and career paths...How to stay relevant as a cyber professional: Skills, trends and career paths...
How to stay relevant as a cyber professional: Skills, trends and career paths...
 
Talking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual AidsTalking Tech through Compelling Visual Aids
Talking Tech through Compelling Visual Aids
 
managing Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptxmanaging Behaviour in early childhood education.pptx
managing Behaviour in early childhood education.pptx
 
Contiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptxContiguity Of Various Message Forms - Rupam Chandra.pptx
Contiguity Of Various Message Forms - Rupam Chandra.pptx
 
Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024Brand Guideline of Bashundhara A4 Paper - 2024
Brand Guideline of Bashundhara A4 Paper - 2024
 
Diversity Quiz Finals by Quiz Club, IIT Kanpur
Diversity Quiz Finals by Quiz Club, IIT KanpurDiversity Quiz Finals by Quiz Club, IIT Kanpur
Diversity Quiz Finals by Quiz Club, IIT Kanpur
 
How to Create User Notification in Odoo 17
How to Create User Notification in Odoo 17How to Create User Notification in Odoo 17
How to Create User Notification in Odoo 17
 
Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17Creation or Update of a Mandatory Field is Not Set in Odoo 17
Creation or Update of a Mandatory Field is Not Set in Odoo 17
 
Creating Images and Videos through AI.pptx
Creating Images and Videos through AI.pptxCreating Images and Videos through AI.pptx
Creating Images and Videos through AI.pptx
 
A Quiz on Drug Abuse Awareness by Quizzito
A Quiz on Drug Abuse Awareness by QuizzitoA Quiz on Drug Abuse Awareness by Quizzito
A Quiz on Drug Abuse Awareness by Quizzito
 
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT KanpurDiversity Quiz Prelims by Quiz Club, IIT Kanpur
Diversity Quiz Prelims by Quiz Club, IIT Kanpur
 
The Rise of the Digital Telecommunication Marketplace.pptx
The Rise of the Digital Telecommunication Marketplace.pptxThe Rise of the Digital Telecommunication Marketplace.pptx
The Rise of the Digital Telecommunication Marketplace.pptx
 
220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx220711130088 Sumi Basak Virtual University EPC 3.pptx
220711130088 Sumi Basak Virtual University EPC 3.pptx
 
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
220711130100 udita Chakraborty  Aims and objectives of national policy on inf...220711130100 udita Chakraborty  Aims and objectives of national policy on inf...
220711130100 udita Chakraborty Aims and objectives of national policy on inf...
 
What are the new features in the Fleet Odoo 17
What are the new features in the Fleet Odoo 17What are the new features in the Fleet Odoo 17
What are the new features in the Fleet Odoo 17
 
Keynote given on June 24 for MASSP at Grand Traverse City
Keynote given on June 24 for MASSP at Grand Traverse CityKeynote given on June 24 for MASSP at Grand Traverse City
Keynote given on June 24 for MASSP at Grand Traverse City
 

VPN Theory

  • 1. VPNVPN Copyright by Hacking Feder Powered by LJ Projects
  • 2. WHY VPN? • Geographically separate offices need to communicate. • Collaboration • Mobile users • One Network •
  • 4. VPN • Allows a trusted network to communicate to another trusted network over un-trusted public network. • Used to extend an enterprise’s internal private network.
  • 5. VPN •Definition: Network of virtual circuits that carries private traffic through public or shared networks such as the Internet or those provided by network service providers.
  • 6. VPN
  • 7. VPN-BENEFITS • Extends geographical connectivity, • Improves Security • Reduces operational costs versus a traditional WAN •Improves productivity.
  • 8. VPN-BENEFITS • Simplifies network topology. • Provides global networking opportunities. • Reduces transit time and transportation costs for remote users.
  • 9. VPN-CHARACTERISTICS • Traffic is encrypted • Remote site is authenticated • Multiple protocol support, • Connection is point to point.
  • 10. TUNNELLING Tunnel – a means of forwarding data across a network from one node to another, as if two nodes were directly connected. How it is achieved? Encapsulation / Encapsulating the Data
  • 11. Encrypted Inner Datagram Datagram Header Outer Datagram Data Area Original Datagram TUNNELLING
  • 12. ENCAPSULATION • Extra header is added to the data sent by the transmitting end of the tunnel. • Data is forwarded by intermediate nodes based on the outer header without looking at the contents of the original packet.
  • 13. ENCAPSULATION So technically… VPN is a group of one or more secure IP tunnel.
  • 14. FOUR CRITICAL FUNCTIONS Authentication – validates that the data was sent from the sender. Access control – limiting unauthorized users from accessing the network. Confidentiality – preventing the data to be read or copied as the data is being transported. Data Integrity – ensuring that the data has not been altered
  • 15. VPN PROTOCOLS PPTP - Point-to-Point Tunneling Protocol L2TP - Layer 2 Tunneling Protocol IPsec - Internet Protocol Security SOCKS - is not used as much as the ones above
  • 17. TYPES OF VPN • Trusted VPN • Secure VPN • Hybrid VPN
  • 18. REQUIREMENTS – SECURE VPN • All traffic on the secure VPN must be encrypted and authenticated. • The security property of the VPN must be agreed to by all parties in the VPN. • No one outside the VPN can affect the security property of the VPN.
  • 19. REQUIREMENTS – TRUSTED VPN • No one other than the trusted VPN provider can affect the creation or modification of a path in the VPN. •No one other than the trusted VPN provider can change data, inject data, or delete data on a path in the VPN.
  • 20. REQUIREMENTS – TRUSTED VPN •The routing and addressing used in a trusted VPN must be established before the VPN is created.
  • 21. REQUIREMENTS – HYBRID VPN • The address boundaries of the secure VPN within the trusted VPN must be extremely clear. • The admin should be able to say which one is secure VPN, when there is a Hybrid VPN setup.
  • 22. TECHNOLOGIES SUPPORTED – SVPN • IPSec with Encryption • Either tunnel or transport modes. • Security association can be set up either manually or using IKE with either certificates or pre-shared secrets. • IPSec inside of L2TP •SSL 3.0 or TLS with encryption. •TLS – RFC 3193
  • 23. IPSec RFC • IKEv1 • 2401, 2406, 2407, and 2409 •IKEv2 • 4301, 4303, 4306, 4307, and 4308
  • 24. TECHNOLOGIES SUPPORTED – TVPN • Mainly classified into: • Layer 2 VPN, and • Layer 3 VPN
  • 25. TECHNOLOGIES SUPPORTED – TVPN • Layer 2 VPN • ATM Circuits • Frame Relay Circuits, and • Transport of Layer 2 frames over MPLS.
  • 26. TECHNOLOGIES SUPPORTED – TVPN • Layer 3 VPN • MPLS with constrained distribution of routing information through BGP. (RFC 4364).
  • 27. TECHNOLOGIES SUPPORTED – HVPN • Any supported secure VPN technologies running over any supported trusted VPN technology.
  • 28. VPN IN LINUX • IPSec – • Standard developed by International Engineering Task Force – IETF • Linux includes IPSec support – Linux 2.6 kernel. • Offer administrative interface – ipsec- tools
  • 29. VPN IN LINUX •PPP over OpenSSH • Method & not a tool. • With the existing tools, you can configure a PPP interface to use SSH to encrypt all data that goes across the PPP interface. • Poor performance when compared to other.
  • 30. VPN IN LINUX •OpenVPN • www.openvpn.net • Can create a tunnel to remote systems over public networks with encryption and authentication features. • yum install openvpn
  • 31. VPN IN LINUX • openswan • www.openswan.org • An implementation of IPSec that was originally based on code from the FreeS/WAN project. (www.freeswan.org). • yum install openswan
  • 32. VPN IN LINUX • Crypto IP Encapsulation (CIPE) • IP Packets are routed across selected IP interfaces as encrypted UDP packets. • Easy to setup • Less overhead than PPP over OpenSSH • Means better performance. • Drawback – Since not a standard implementation, not available on all distro
  • 33. UNDERSTANDING IPSec •IPSec consists of two primary protocols: • Authentication Header (AH) • Encapsulating Security Payload (ESP)
  • 36. UNDERSTANDING IPSec Tunnel Mode •Entire IP datagram is encapsulated into the new IP datagram by IPSec. •Protects both data and the control information.
  • 37. UNDERSTANDING IPSec Transport Mode • Only the data (payload) is encrypted. • To do this, IPSec inserts its own header between the IP header and the protocol header for the upper layer.
  • 38. UNDERSTANDING IPSec Transport Mode AH IP Header -> AH Header -> TCP Header + Payload ESP IP Header -> ESP -> TCP HEader + Payload ================================================= Tunnel Mode AH IP Header -> AH Header -> Original IP Header -> TCP Header + Payload ESP IP Header -> ESP -> IP Header + TCP Header + Payload
  • 44. UNDERSTANDING IPSec •Review – Features of VPN • Authentication, • Encryption •For authentication and exchange of symmetric keys, IPSec uses the Internet Key Exchange – IKE protocol.
  • 45. UNDERSTANDING IPSec •At the beginning of communication, IKE: •Authenticates the peer computer, •Negotiates security associations, •Choose secret symmetric keys (using Diffie Hellmann key exchange)
  • 46. UNDERSTANDING IPSec • Result/ •Security Association - SA •The SA made is stored in Security Association Database – SAD.
  • 47. UNDERSTANDING IPSec • SA consists of: • information about the communications endpoints – eg public IP address. • whether AH or ESP are being used with IPSec, and • The secret key / algorithm being used.
  • 48. UNDERSTANDING IPSec •HMAC – Hash Message Authentication Codes • Send through the Protocol Header • Message Authentication Code • Calculated using a specific algorithm involving cryptographic hash function in combination with a secret key.
  • 49. UNDERSTANDING IPSec HMAC offers the following advantages: • Data Integrity – The HMAC created using the hash algorithm, secret key and data in the IP datagram can be checked at the receiver end by reversing the order. • Data privacy Datagrams are encrypted using symmetric encryption algorithms.
  • 50. IPSec – DoS Attack • Recording and replaying sequence of packets can cause denial of service attacks. • IPSec combats this type of attacks • Accepts only packets that are within a “sliding window” of sequence numbers or higher. • Packets using older sequence numbers are dropped.
  翻译: