Академический Документы
Профессиональный Документы
Культура Документы
VPNs
Since we all understand that IP is used to transport information
between LANs if we add some security stuff to IP then this transport can be made more secure Can be done two ways: At the network level using IPSec
Currently the most widely used method
But requires special client installation on each workstation (more IT $)
IP Based VPNs
Fundamental Components
IP Encapsulation Cryptographic based authentication
Secret Key Encryption
Single shared secret key for encrypt and decrypt
IP/IP Encapsulation
Makes remotely located LANs appear to be adjacent Makes non-routable addresses (10.a.b.c a,d 192.168.c.d) routable
VPN Characteristics
Cheaper than WANs
dedicated leased lines are very expensive Easier to establish than WANs ISPs will usually help make the initial IP connection hours for VPNs vs. weeks for WANs slower than LANs encryption/dectyption takes time typical LANS are 10-100 Mbps
endpoints connected by VPM may go through many router hops
minimize by using same ISP for everything
dial in users are going to be typically 56Kbps less reliable than WANs with WANs routers are under your control and performance is negotiated
with provider, not so with VPN you only control initial IP connection
Types of VPNs
Server based
Firewall based
Server based
Windows
Routing and Remote Access Service
NT supports only PPTP, W/2000 supports PPTP, L2TP and IPSec comes with everything needed to establish a VPN
Linux
Blowfish, Free S/WAN, PPP over SSL, PPTP, L2TP with IP masquerading/IP Chains and additional open source software can
be used to create a very robust VPN
UNIX
many incorporating IPSec into their TCP/IP stacks Be aware that VPN traffic leaving your LAN traverses the LAN twice once to the RRAS service as regular LAN traffic, once encapsulated to the
firewall
VPN Architectures
Mesh
each participant has a direct security relationship with every other user Hub and spoke each participant has a single security association with a single VPN router
that has a security association with every VPN device
Hybrid
combination of both
mesh of hubs star of hubs
Implementations
IPSec Tunnel Mode
RFC 2401
NIAP
National Information Assurance Partnership (NIAP)
U.S. Government initiative originated to meet the security testing
needs of both information technology (IT) consumers and producers. NIAP is a collaboration between the National Institute of Standards and Technology (NIST) and the National Security Agency (NSA) in fulfilling their respective responsibilities under PL 100-235 (Computer Security Act of 1987). combines the extensive IT security experience of both agencies to promote the development of technically sound security requirements for IT products and systems and appropriate measures for evaluating those products and systems.
NIAP Goals
The long-term goal of NIAP is to help increase the level of
trust consumers have in their information systems and networks through the use of cost-effective security testing, evaluation, and validation programs. In meeting this goal, NIAP seeks to:
Promote the development and use of evaluated IT products and
systems; Champion the development and use of national and international standards for IT security; Foster research and development in IT security requirements definition, test methods, tools, techniques, and assurance metrics; Support a framework for international recognition and acceptance of IT security testing and evaluation results; and Facilitate the development and growth of a commercial security testing industry within the U.S.
CCEVS
Common Criteria Evaluation and Validation Scheme
jointly managed activity of NIST and NSA (NIAP) the validation body focus of the CCEVS is to establish a national program for the
evaluation of information technology products for conformance to the International Common Criteria for Information Technology Security Evaluation. Common Criteria Testing Laboratory (CCTL) an approved testing laboratory Validation body reviews products tested by CCTL awards certification (or not) maintains a list of validated products (VPL)
Netifice
Browser based Java Agent Based SSL Windows client for desktop access