+ All Categories
Home > Documents > Network Access for Remote Users

Network Access for Remote Users

Date post: 24-Feb-2016
Category:
Upload: edith
View: 34 times
Download: 3 times
Share this document with a friend
Description:
Network Access for Remote Users . Dr John S. Graham ULCC [email protected]. Review of Technologies. Remote Site Private Leased Lines Kilostream or Megastream Circuits LES ISDN EPS9 ISP Remote User Private Dialup Service ISP. Site-to-Site Private Infrastructure. - PowerPoint PPT Presentation
Popular Tags:
21
Network Access for Remote Users Dr John S. Graham ULCC [email protected]
Transcript
Page 1: Network Access for Remote Users

Network Access for Remote Users Dr John S. Graham

[email protected]

Page 2: Network Access for Remote Users

Review of Technologies• Remote Site

– Private Leased Lines• Kilostream or Megastream Circuits• LES

– ISDN– EPS9– ISP

• Remote User– Private Dialup Service– ISP

Page 3: Network Access for Remote Users

Site-to-Site Private Infrastructure

Page 4: Network Access for Remote Users

Traditional Dialup Service

High CostsSupport BurdenLimited to 56K Analogue DialupLimited Service

Security Guaranteed

Page 5: Network Access for Remote Users

Virtual Private Network

Highly Flexible SolutionUses Existing Infrastructure

Complex Security Issues

Page 6: Network Access for Remote Users

VPN Roadmap

Tunnelling

Sym metric Asymm etric

Encryption

Endpoints Data User

Authentication IP Framew ork

VPN

Page 7: Network Access for Remote Users

Tunnelling Methods• Layer III

– GRE– IPSec

• Layer II– L2F– PPTP– L2TP

Page 8: Network Access for Remote Users

Layer 3 Tunnelling (GRE)

TCPIP DataGREIP

GRE

TCPIP Data

passenger protocol

encapsulating protocol

carrier protocol

Page 9: Network Access for Remote Users

Tunnelling In Action

IP GRE TCPIP Data

Source 62.49.38.138Destination

192.168.17.26194.82.103.186

IP GRE TCPIP Data

192.168.17.26

Page 10: Network Access for Remote Users

Layer 2 Tunnelling (L2TP)

TCPIP DataL2TPUDPIP PPP

TCPIP DataL2TPUDPIP PPPESP ESP

L2TP

L2TP + IPSec

TCPIP DataPPP

Page 11: Network Access for Remote Users

Layer 2 Tunnelling Modes

Compulsory L2 Tunnelling

Voluntary L2 Tunnelling

Page 12: Network Access for Remote Users

Authentication• Peer Identity

– Shared Secret– Digital Certificate

• Data Integrity– Digital Signatures

• User Identity– Kerberos– RADIUS

Page 13: Network Access for Remote Users

IP Security (IPSec)• Protocols

– Authentication Header– Encapsulating Security Payload– Internet Key Exchange

• Modes– Tunnel– Transport

Page 14: Network Access for Remote Users

IPSec Protocols

Sequence Number

Authentication Data

SPI

NextHeader

PayloadLength Reserved

Sequence Number

SPI

Authentication Data

Data

NextHeader

PadLengthPad

IV

Authentication Header (51) Encapsulating Security Protocol (50)

Page 15: Network Access for Remote Users

IPSec ModesTunnel Mode

Transport Mode

IP AH/ESP TCPIP Data

AH/ESP TCPIP Data

Page 16: Network Access for Remote Users

Equipment at Remote Site

• ‘Wires Only’ ADSL Connection– One Static IP Address

• Splitter• Cisco 827H Router

– Ethernet hub (4 ports) plus ATM port

Page 17: Network Access for Remote Users

Customer Installation

Page 18: Network Access for Remote Users

Router Configuration

Routing Table

NAT IPSec

Tunnel

Dialer

A1

A2

B1

B2

B3

Ethernet

Page 19: Network Access for Remote Users

IPSec Followed by NAT• Immutable fields of outer IP header

included in AH protocol’s ICV data.• Transport mode IPSec renders

TCP/UDP checksums invalid.• Multiple incompatibilities between

SA parameters and NAT.

http://www.ietf.org/internet-drafts/draft-ietf-ipsec-nat-reqts-04.txt

Page 20: Network Access for Remote Users

Fragmentation Hell

Page 21: Network Access for Remote Users

http://www.ja.net/documents/


Recommended