Security: Encapsulation and Encryption The key to VPN technology is security VPNs secure data by: – encapsulating the data – or encrypting the data – or both encapsulating the data an
Trang 1Module 7: Implementing VPN
Trang 2 What Is Needed to Build a VPN?
Overlay and Peer-to-Peer VPN Architecture
VPN Topologies
Characteristics of a Secure VPNs
VPN Security: Encapsulation
VPN Security: IPsec and GRE
VPN Security: Symmetric and Asymmetric
Trang 3Virtual Private Networks (VPNs)
A virtual private network (VPN) is a concept that describes how to
create a private network over a public network infrastructure while maintaining confidentiality and security
VPNs use cryptographic tunneling protocols to provide sender
authentication, message integrity, and confidentiality by protecting against packet sniffing
VPNs can be implemented at Layers 2, 3, and 4 of the Open Systems Interconnection (OSI) model.
Trang 4Virtual Private Networks (VPNs)
A Virtual Private Networks (VPN) creates a private connection, or
network, between two endpoints
This is a virtual connection because the physical means of
connectivity is indifferent to the safety of the data involved
IPsec adds a layer of protection to the data that travels across the VPN
Trang 5VPN Components
1 An existing network with servers and workstations
2 Connection to the Internet
3 VPN gateways (i.e., routers, PIX, ASA, VPN concentrators)
that act as endpoints to establish, manage, and control VPN connections
4 Software to create and manage tunnels
Trang 6Security: Encapsulation and Encryption
The key to VPN technology is security
VPNs secure data by:
– encapsulating the data
– or encrypting the data
– or both encapsulating the data and then encrypting the data
Encapsulation is also referred to as tunneling
– encapsulation transmits data transparently from network to network through
a shared network infrastructure
Encryption codes data into a different format
– Decryption decodes encrypted data into the data’s original unencrypted
format
Trang 7 Service providers (SPs) are the most common users of the overlay VPN
model
The design and provisioning of virtual circuits (VC) across the backbone
is complete prior to any traffic flow
In the case of an IP network, this means that even though the underlying
technology is connectionless, it requires a connection-oriented approach to
Overlay VPNs
Trang 8Overlay VPNs
L2 overlay VPN:
–L2 overlay VPNs are independent of the network protocol
used by the customer meaning that the VPN is not limited to carrying IP traffic
–If the carrier offers the appropriate ATM service, the overlay VPN will carry any kind of information
–Frame Relay VPNs are normally limited to data applications, although voice over Frame Relay customer premises equipment (CPE) devices may be useable on some services.
Trang 9 The overlay model includes L2 and L3 VPNs.
Overlay VPNs
Trang 10Extra: Layer2- Based VPN Services
Trang 11CPE-Based VPN
(Peer-to-Peer)
CPE-based VPN is another name for an L3 overlay VPN
The VPN is implemented using CPE.
Customer creates a VPN:
– across an Internet connection
– without any specific knowledge or cooperation from the service provider
Customer gains increased privacy using an inexpensive Internet
connection.
SP loses opportunity for VPN service revenue
Trang 12SP-Provisioned VPN
Multiprotocol Label Switching (MPLS) combines:
– the benefits of overlay VPNs (security and isolation among customers)
– benefits of the simplified routing of a peer-to-peer VPN
Only the Provider Edge (PE) routers need to be provisioned to support the VPNs
Note that MPLS VPNs cannot replace all VPN implementations because MPLS only supports IP as the Layer 3 protocol Other protocols including IPX and
AppleTalk must be tunneled through the IP backbone.
MPLS will be discussed in the chapter 4
Trang 13VPN Topologies
Remote Access VPN
Site-to-Site VPNs
Trang 14VPN Topologies
Remote Access VPN
Provide remote users access to
an intranet or extranet over a
Trang 15VPN Topologies
Remote Access VPN
The party negotiating a secure connection with the VPN Gateway uses VPN
client software
The VPN Client software allows telecommuters and traveling users to
communicate on the central network and access servers from many different
locations
Tunnels are created using either:
–IPsec
–Point to Point Tunneling Protocol (PPTP) - Microsoft
–Layer 2 Tunnel Protocol (L2TP)
–Layer 2 Forwarding (L2F) Protocol - Cisco
Trang 16–Help increase productivity and confidence by ensuring secure
network access regardless of an employee’s location.
Trang 17 Site-to-Site Intranet VPNs allow access only to trusted employees
Gateways at various physical locations within the same business.
Negotiate secure tunnels across the Internet
Trang 18VPN Topologies
Site-to-Site Intranet VPN
Example
–Data Center or mainframe at Main Office
–Remote Offices have access to Data Center
–Users from the networks on either side of the tunnel can
communicate with one another as if the networks were a single network
These networks may need:
–strong encryption
–strict performance (QoS) and bandwidth requirements
Tunnels are created using either:
–IPsec
–IPsec/GRE
Trang 20VPN Topologies
Site-to-Site Extranet VPN
VPN links to an enterprise customer's network over a shared
infrastructure using dedicated connections:
–outside customers
–Suppliers
–partners
–communities of interest to an enterprise customer's network over a
shared infrastructure using dedicated connections
Extranet VPNs allow access to users who are outside the enterprise
Use firewalls and VPN tunnels
–Secure access to specific data and resources
–Not gaining access to private corporate information
Trang 22Characteristics of a Secure VPNs
Trang 23Characteristics of a
Secure VPNs
Authentication
Ensures that a message:
–comes from an authentic source and
–goes to an authentic destination
VPN technologies are making use of several reputable methods for
establishing the identity of the party at the other end of a network
– passwords
– digital certificates
– smart cards
– biometrics
Trang 24Characteristics of a
Secure VPNs
Data confidentiality
Protecting data from eavesdroppers
intercepted by unauthenticated or unauthorized sources
– encapsulation
– and encryption
Trang 25 Data integrity guarantees that between the source and destination:
– No tampering or alternation to data
VPNs typically use one of three technologies to ensure data integrity:
– one-way hash functions
– message authentication codes (MAC)
– digital signatures
Trang 26VPN Security:
Encapsulation
Major components of confidentiality:
– Encapsulation (major components of confidentiality)
– Encryption (is the other)
Tunneling is the transmission of data through a public network so that
routing nodes in the public network are unaware that the transmission is part of a private network
Tunneling allows the use of public networks to carry data on behalf of
users as though the users had access to a private network
Trang 27VPN Security:
Encapsulation
VPNs build tunnels by:
–encapsulating the private network data and protocol information
within public network protocol data
–tunneled data is not available to anyone examining the transmitted
data frames.
Tunneling is the process of placing an entire packet within another packet and sending the new, composite packet over a network
Trang 28VPN Security:
Encapsulation
Three different protocols that tunneling uses:
–Carrier protocol:
• The protocol the information is traveling over
• Frame Relay, PPP, ATM, etc.
Trang 29VPN Security: IPsec and GRE
network for IP unicast only
multicast, dynamic IGP routing protocols, or non-IP protocols is required
Trang 30VPN Security: IPsec and GRE
Tunnel mode encrypts the header and the payload of each packet.
Transport mode only encrypts the payload
GRE encloses the IP header and payload of packets with a
Trang 31VPN Security: Symmetric and Asymmetric Encryption Algorithms
The primary methods of encryption are symmetric-key (or secret
key) encryption and asymmetric (or public key) encryption.
Trang 32VPN Security: Symmetric and Asymmetric Encryption Algorithms
Computing Power Requirements of Cryptographic Algorithms
Asymmetric encryption demands significantly more computing power than
symmetric encryption demands The longer the key is, the more processing power is used.
Typically symmetric encryption is used to encrypt large amounts of data
because it is far more efficient than using asymmetric encryption
Asymmetric encryption is typically used for authentication purposes.
Trang 33Symmetric Encryption Algorithms
ciphers and block ciphers
–Stream ciphers encrypt the bits of the message one at a time,
–Block ciphers take a number of bits and encrypt them as a single unit A block cipher operates on fixed-length groups of bits, termed blocks, with an unvarying transformation
Trang 34Symmetric Encryption Algorithms
algorithm
Trang 35Symmetric Encryption Algorithms
Symmetric Encryption: DES
DES is now considered to be insecure for many applications, mainly due
to the DES 56-bit key size being too small DES keys have been broken in less than 24 hours
Trang 36Symmetric Encryption Algorithms
Symmetric Encryption: 3DES
While 3DES has a key length of 168 bits (three 56-bit DES keys), its
effective key length from a security point of view is only 112 bits.
Trang 37Symmetric Encryption Algorithms
Symmetric Encryption: AES
AES, often referred to as the Rijndael encryption (pronounced “Rhine
dahl”), is a block cipher that was adopted as an encryption standard by the U.S government.
Trang 38– RSA authenticates the remote device
– Diffie-Hellman exchanges keys that are used for encryption
Trang 39Diffie-Hellman Key Exchange
User B exchange public keys and a calculation is performed on their individual private key and on the
process is an identical shared key The shared key
is used to encrypt and decrypt the data
Trang 40Diffie-Hellman Key Exchange
Trang 41Diffie-Hellman Key Exchange
Trang 42Diffie-Hellman Key Exchange
Trang 44VPN Security: Authentication
Trang 45VPN Security: Authentication
Authentication, authorization, and accounting
(AAA) servers are used for more secure access in a
remote-access VPN environment
dialup client, the request is proxied to the AAA server
AAA then checks and records the following:
– Who the client is (authentication)
– What the client is allowed to do (authorization)
– What the client actually does (accounting)
Trang 46Module 7: Implementing VPN
Trang 47Objectives
Trang 48IPsec Security Features
transmission over IP networks, ensuring
confidentiality, integrity, and authenticity of data communications over unprotected networks such as the Internet
standard (RFC 2401-2412) that defines how a VPN can
be created over IP networks IPsec provides the following essential security functions:
Trang 49IPsec Protocols and Headers
IPsec includes:
– 1 protocol for exchanging keys called Internet Key Exchange (IKE) ,
this key is used for Symmetric Encryption
–2 IPsec IP protocols, Encapsulating Security Payload (ESP) (50)
and Authentication Header (AH) (51)
In simple terms, IPsec provides secure tunnels between two peers,
such as two routers.
these tunnels are sets of Security Associations (SA)s
established between two remote IPsec peers.
The Security Associations define which protocols and
algorithms should be applied to sensitive packets and specify the keying material to be used by the two peers.
Security Associations are unidirectional and are established by
the security protocol that is being used (AH or ESP).
Trang 50© 2010 Cisco Systems, Inc All rights reserved.
Trang 51IPsec Protocols and Headers
Trang 52IPsec Protocols and Headers
Trang 53IPsec Protocols and Headers
Trang 54© 2010 Cisco Systems, Inc All rights reserved.
ROUTE
54
Manual IPSec
Trang 55Internet Key Exchange
keys with the IKE uses UDP port 500
generate symmetrical keys to be used by two IPsec peers
parameters, such as data to be protected, strength of the keys, hash methods used, and whether packets are protected from replay
Trang 56Internet Key Exchange
Trang 57Internet Key Exchange
A security association (SA) requires the following:
Internet Security Association and Key Management Protocol
(ISAKMP): ISAKMP is a protocol framework that defines the
mechanics of implementing a key exchange protocol and negotiating a security policy ISAKMP can be implemented over any transport protocol The reference document for ISAKMP is RFC 2408.
SKEME: A key exchange protocol that defines how to derive
authenticated keying material with rapid key refreshment.
OAKLEY: A key exchange protocol that defines how to acquire
authenticated keying material The basic mechanism for OAKLEY
is the DH key exchange algorithm The reference document is
RFC 2412: The OAKLEY Key Determination Protocol.
Trang 58Internet Key Exchange
IKE includes these features:
Eliminates the need to manually specify all of the IPsec
security parameters at both peers
Allows specification for a lifetime for the IPsec SA
Allows encryption keys to change during IPsec sessions
Allows IPsec to provide anti-replay services
Permits certification authority (CA) support for a manageable,
scalable IPsec implementation
Allows dynamic authentication of peers
Trang 59IKE Phases and Modes
Trang 60IKE Phases and Modes
Trang 61IKE Phase 1: Management Tunnel Setup
The purpose of IKE Phase 1 is to create a secure management tunnel between two IPSec peers for the purpose of establishing, maintaining, and tearing down a VPN tunnel
In IKE Phase 1, the following steps occur:
Step 1 Security Association negotiation and exchange - A secure communications channel is
created between two IPSec peers through the negotiation and exchange of IKE policy information
known as Security Associations (SAs)
IKE Phase 1 SAs carry policy parameters in constructs called transforms Transforms define the
following:
- Encryption algorithm used: DES, 3DES, AES
- Hashing algorithm to be used (integrity check): MD5, SHA-1
- Authentication algorithm to be used-Preshare, Rivest, Shamir, and Adelman (RSA) certificates, or RSA nounces
- Mode (method of transferring the policy information): Main or aggressive
- Diffie-Hellman key length: Group 1 768 or Group 2 1024
Both sides must agree to the same parameters for all values defined in the transform, or no tunnel will
be established
Step 2 Diffie-Hellman Key Exchange- Used to allow both parties to create and exchange a shared
secret key over an insecure channel After the key is exchanged, all subsequent tunnel management traffic between the peers will be encrypted using the shared secret
Step 3 Authentication- Peer authentication can be done using either preshared keys configured
manual on both peers, RSA certificates using the PKI X.509 specification, or RSA nounces, which use random number generation encryption and exchanges to authenticate
Trang 62© 2010 Cisco Systems, Inc All rights reserved.
ROUTE
62
IKE Phase 2: IPSec Tunnel Setup
The purpose of IKE Phase 2 is to create a VPN tunnel between two IPSec peers for the purpose
of exchanging data across a secure channel over an untrusted network IKE Phase 2 is
conducted over the secure channel created in IKE Phase 1
In IKE Phase 2, the following steps occur:
Step 1 SA negotiation and exchange- To establish the IPSec tunnel, both peers must negotiate and
agree upon a security policy Just as in IKE Phase 1, SAs must be established that define how the
packets are to be processed when they are received from their IPSec peer This is done through the
definition and exchange of transforms Transforms for IKE Phase 2 define the following:
Encryption algorithm: DES, 3DES, or AES
Authentication algorithm: MD5 or SHA 1
- IPSec protocol: Encapsulating Security Payload (ESP) or Authentication Header (AH)
- Mode: Transport or tunnel
- Lifetime of the SA
After the policy is defined and agreed upon by both ends, each participant creates an SA for the
session containing all the defined parameters and stores the information in their respective security
policy databases It is important to note that the security policy has to be identical for each participant
on either end of the tunnel The SA is used when a packet arrives to define the processing that is
required to decrypt and authenticate the data To ensure that the correct policy is applied to a received packet, each packet sent across a VPN tunnel carries a Security Parameter Index (SPI) The SPI is
used to look up the appropriate security policy in the database for that peer so that the correct policy is applied to the packet
Step 2 IPSec peers can change security policy parameters associated with a session through the
renegotiation of SAs The Diffie-Hellman key can also be renegotiated but only if Perfect Forward
Secrecy (PFS) has been enabled