+ All Categories
Home > Documents > VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity...

VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity...

Date post: 15-Mar-2018
Category:
Upload: doanbao
View: 217 times
Download: 2 times
Share this document with a friend
41
VIRTUAL PRIVATE VIRTUAL PRIVATE NETWORKS (VPN) NETWORKS (VPN)
Transcript
Page 1: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

VIRTUAL PRIVATE VIRTUAL PRIVATE NETWORKS (VPN)NETWORKS (VPN)

Page 2: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

Traditional Connectivity Traditional Connectivity

[From Gartner Consulting][From Gartner Consulting]

Page 3: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

What is VPN?What is VPN?Virtual Private Network is a type of private Virtual Private Network is a type of private network that uses public telecommunication, network that uses public telecommunication, such as the Internet, instead of leased lines to such as the Internet, instead of leased lines to communicate.communicate.

Became popular as more employees worked in Became popular as more employees worked in remote locations.remote locations.

Terminologies to understand how VPNs work.Terminologies to understand how VPNs work.

Page 4: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

What is a VPNWhat is a VPN

Public networks are used to move information between trusted network segments using

shared facilities like frame relay or atm

A VIRTUAL Private Network replaces all of the above utilizing the public Internet Performance and availability depend on your ISP and the Internet

Page 5: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

Private Networks Private Networks vs. vs.

Virtual Private NetworksVirtual Private NetworksEmployees can access the network (Intranet) Employees can access the network (Intranet) from remote locations.from remote locations.

Secured networks.Secured networks.

The Internet is used as the backbone for VPNsThe Internet is used as the backbone for VPNs

Saves cost tremendously from reduction of Saves cost tremendously from reduction of equipment and maintenance costs.equipment and maintenance costs.

ScalabilityScalability

Page 6: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

Why?Why?

T1 is a 1.544 Mbps point-to-point dedicated, digital circuit provided T1 is a 1.544 Mbps point-to-point dedicated, digital circuit provided by the telephone companiesby the telephone companies

Page 7: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

Remote Access Virtual Private Remote Access Virtual Private NetworkNetwork

(From Gartner Consulting)

Page 8: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

Brief Overview of How it WorksBrief Overview of How it Works

Two connections Two connections –– one is made to the one is made to the Internet and the second is made to the Internet and the second is made to the VPN.VPN.Datagrams Datagrams –– contains data, destination contains data, destination and source information.and source information.Firewalls Firewalls –– VPNs allow authorized users VPNs allow authorized users to pass through the firewalls.to pass through the firewalls.Protocols Protocols –– protocols create the VPN protocols create the VPN tunnels.tunnels.

Page 9: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

Four Critical FunctionsFour Critical FunctionsAuthenticationAuthentication –– validates that the data was validates that the data was sent from the sender.sent from the sender.Access controlAccess control –– limiting unauthorized users limiting unauthorized users from accessing the network.from accessing the network.ConfidentialityConfidentiality –– preventing the data to be preventing the data to be read or copied as the data is being read or copied as the data is being transported.transported.Data IntegrityData Integrity –– ensuring that the data has ensuring that the data has not been altered not been altered

Page 10: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

EncryptionEncryption

Encryption -- is a method of Encryption -- is a method of ““scramblingscrambling”” data before transmitting it onto the Internet.data before transmitting it onto the Internet.

Public Key Encryption TechniquePublic Key Encryption Technique

Digital signature Digital signature –– for authentication for authentication

Page 11: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

TunnelingTunneling

A virtual point-to-point connectionA virtual point-to-point connectionmade through a public network. It transportsmade through a public network. It transportsencapsulated datagrams.encapsulated datagrams.

Encrypted Inner Datagram

Datagram Header Outer Datagram Data Area

Original Datagram

Data Encapsulation [From Comer]

Two types of end points: Remote Access Site-to-Site

Page 12: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

Four Protocols used in VPNFour Protocols used in VPN

PPTP -- Point-to-Point Tunneling ProtocolPPTP -- Point-to-Point Tunneling Protocol

L2TP -- Layer 2 Tunneling ProtocolL2TP -- Layer 2 Tunneling Protocol

IPsec -- Internet Protocol SecurityIPsec -- Internet Protocol Security

SOCKS SOCKS –– is not used as much as the is not used as much as the ones above ones above

Page 13: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

VPN Encapsulation of PacketsVPN Encapsulation of Packets

Page 14: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

Types of ImplementationsTypes of Implementations

What does What does ““implementationimplementation”” mean in mean in VPNs?VPNs?

3 types3 typesIntranet Intranet –– Within an organization Within an organizationExtranet Extranet –– Outside an organization Outside an organizationRemote Access Remote Access –– Employee to Business Employee to Business

Page 15: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

Virtual Private Networks (VPN)Basic Architecture

Page 16: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

VPN Topology: Types of VPNsVPN Topology: Types of VPNs

Remote access VPNRemote access VPNIntranet VPNIntranet VPNExtranet VPNExtranet VPN

Page 17: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

VPN Topology: Remote Access VPN Topology: Remote Access VPNVPN

Page 18: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

VPN Topology: Intranet VPNVPN Topology: Intranet VPN

Page 19: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

VPN Topology: Extranet VPNVPN Topology: Extranet VPN

Page 20: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

VPN ComponentVPN Component

TunnelingTunnelingEncryptionEncryptionAuthentication,Identity Authentication,Identity Integrity, Prevent tamperingIntegrity, Prevent tampering

Page 21: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

TunnelingTunnelingTunnel dalam VPN sebenarnya hanya logical Tunnel dalam VPN sebenarnya hanya logical point-to-point connection dengan otentikasi point-to-point connection dengan otentikasi dan enkripsi dan enkripsi Paket lama dibungkus dalam paket baru. Paket lama dibungkus dalam paket baru. Alamat ujung tujuan terowongan (Alamat ujung tujuan terowongan (tunnel tunnel endpoints) endpoints) diletakkan di destination address diletakkan di destination address paket baru, yang disebut dengan paket baru, yang disebut dengan encapsulation header. encapsulation header. Tujuan akhir tetap ada Tujuan akhir tetap ada pada header paket lama yang dibungkus pada header paket lama yang dibungkus (encapsulated). Saat sampai di endpoint, (encapsulated). Saat sampai di endpoint, kapsul dibuka, dan paket lama dikirimkan ke kapsul dibuka, dan paket lama dikirimkan ke tujuan akhirnya tujuan akhirnya

Page 22: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

Teknologi TunnelingTeknologi TunnelingProtokol Protokol tunneling layer tunneling layer 2 (Data Link Layer) dan 2 (Data Link Layer) dan layer layer 3 (Network Layer) model OSI layer : 3 (Network Layer) model OSI layer : Tunneling Layer Tunneling Layer 2 (Data Link Layer) : 2 (Data Link Layer) :

PPTP (Point to Point Tunneling Protocol) PPTP (Point to Point Tunneling Protocol) L2TP (Layer 2 Tunneling Protocol) L2TP (Layer 2 Tunneling Protocol) L2F (Layer 2 Forwarding) L2F (Layer 2 Forwarding)

Tunnelling Layer Tunnelling Layer 3 (Network Layer): 3 (Network Layer): IPSec (IP Security) IPSec (IP Security) VTP (Virtual Tunneling Protocol) VTP (Virtual Tunneling Protocol) ATMP (Ascend Tunnel Management Protocol)ATMP (Ascend Tunnel Management Protocol)

Page 23: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

Point-to-Point Tunneling Point-to-Point Tunneling Protocol (PPTP)Protocol (PPTP)

PPTP merupakan protokol jaringan yang PPTP merupakan protokol jaringan yang memungkinkan pengamanan transfer data dari memungkinkan pengamanan transfer data dari remote client ke server pribadi perusahaan remote client ke server pribadi perusahaan dengan membuat sebuah VPN melalui TCP/IP. dengan membuat sebuah VPN melalui TCP/IP. Umumnya terdapat tiga komputer yang Umumnya terdapat tiga komputer yang diperlukan untuk membangun PPTP, yaitu diperlukan untuk membangun PPTP, yaitu sebagai berikut :sebagai berikut :Klien PPTP, Network access server (NAS), Klien PPTP, Network access server (NAS), Server PPTPServer PPTP

Page 24: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

Layer 2 Tunneling Protocol Layer 2 Tunneling Protocol (L2TP)(L2TP)

L2TP adalah tunneling protocol yang L2TP adalah tunneling protocol yang memadukan dua buah tunneling protokol memadukan dua buah tunneling protokol yaitu L2F (Layer 2 Forwarding) milik cisco yaitu L2F (Layer 2 Forwarding) milik cisco dan PPTP milik Microsoft. dan PPTP milik Microsoft. Umumnya L2TP menggunakan port 1702 Umumnya L2TP menggunakan port 1702 dengan protocol UDP untuk mengirimkan dengan protocol UDP untuk mengirimkan L2TP encapsulated PPP frames sebagai L2TP encapsulated PPP frames sebagai data yang di tunnel.data yang di tunnel.

Page 25: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

Seperti gambar di bawah ini :Seperti gambar di bawah ini :

Gambar 3. Perangkat L2TP

Page 26: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

Perangkat dasar L2TP :Perangkat dasar L2TP :Remote Client Remote Client Suatu Suatu end system end system atau atau router router pada jaringan pada jaringan remote access remote access (mis. : (mis. : dial-up clientdial-up client).).L2TP L2TP Access Concentrator Access Concentrator (LAC)(LAC)Sistem yang berada disalah satu ujung Sistem yang berada disalah satu ujung tunnel tunnel L2TP dan L2TP dan merupakan merupakan peer peer ke LNS. Berada pada sisi ke LNS. Berada pada sisi remote clientremote client/ ISP. / ISP. Sebagai pemrakarsa Sebagai pemrakarsa incoming call incoming call dan penerima dan penerima outgoing outgoing callcall..L2TP L2TP Network Server Network Server (LNS)(LNS)Sistem yang berada disalah satu ujung Sistem yang berada disalah satu ujung tunnel tunnel L2TP dan L2TP dan merupakan merupakan peer peer ke LAC. Berada pada sisi jaringan korporat. ke LAC. Berada pada sisi jaringan korporat. Sebagai pemrakarsa Sebagai pemrakarsa outgoing call outgoing call dan penerima dan penerima incoming incoming callcall..Network Access Server Network Access Server (NAS)(NAS)NAS dapat berlaku seperti LAC atau LNS atau kedua-duanya.NAS dapat berlaku seperti LAC atau LNS atau kedua-duanya.

Page 27: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

Model Compulsory L2TP, Model Compulsory L2TP, seperti gambar di bawah seperti gambar di bawah

ini :ini :

Gambar 4. Model Compulsory L2TP

Page 28: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

Compulsory L2TP, melakukan :Compulsory L2TP, melakukan :1.1. Remote clientRemote client memulai koneksi PPP ke LAC melalui PSTN. memulai koneksi PPP ke LAC melalui PSTN.

Pada gambar diatas LAC berada di ISP.Pada gambar diatas LAC berada di ISP.2.2. ISP menerima koneksi tersebut dan link PPP ditetapkan. ISP menerima koneksi tersebut dan link PPP ditetapkan. 3.3. ISP melakukan partial authentication (pengesahan ISP melakukan partial authentication (pengesahan

parsial)untuk mempelajari user name. Database map user parsial)untuk mempelajari user name. Database map user untuk layanan-layanan dan endpoint tunnel LNS, dipelihara untuk layanan-layanan dan endpoint tunnel LNS, dipelihara oleh ISP. oleh ISP.

4.4. LAC kemudian menginisiasi tunnel L2TP ke LNS. LAC kemudian menginisiasi tunnel L2TP ke LNS. 5.5. Jika LNS menerima koneksi, LAC kemudian Jika LNS menerima koneksi, LAC kemudian

mengencapsulasi PPP dengan L2TP, dan meneruskannya mengencapsulasi PPP dengan L2TP, dan meneruskannya melalui tunnel yang tepat.melalui tunnel yang tepat.

6.6. LNS menerima frame-frame tersebut, kemudian LNS menerima frame-frame tersebut, kemudian melepaskan L2TP, dan memprosesnya sebagai frame melepaskan L2TP, dan memprosesnya sebagai frame incoming PPP biasa. incoming PPP biasa.

7.7. LNS kemudian menggunakan pengesahan PPP untuk LNS kemudian menggunakan pengesahan PPP untuk memvalidasi user dan kemudian menetapkan alamat IP. memvalidasi user dan kemudian menetapkan alamat IP.

Page 29: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

Model Voluntary L2TPModel Voluntary L2TP

Gambar 5. Model Voluntary L2TP

Page 30: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

Voluntary L2TP, melakukan :Voluntary L2TP, melakukan :1.1. Remote client Remote client mempunyai koneksi mempunyai koneksi pre- established pre- established ke ISP. ke ISP.

Remote Client befungsi juga sebagai LAC. Dalam hal ini, Remote Client befungsi juga sebagai LAC. Dalam hal ini, host host berisi berisi software client software client LAC mempunyai suatu koneksi ke LAC mempunyai suatu koneksi ke jaringan publik (internet) melalui ISP.jaringan publik (internet) melalui ISP.

2.2. Client Client L2TP (LAC) menginisiasi L2TP (LAC) menginisiasi tunnel tunnel L2TP ke LNS.L2TP ke LNS.3.3. Jika LNS menerima koneksi, LAC kemudian meng-Jika LNS menerima koneksi, LAC kemudian meng-

encapsulasi PPP dengan L2TP, dan meneruskannya encapsulasi PPP dengan L2TP, dan meneruskannya melalui melalui tunneltunnel. .

4.4. LNS menerima LNS menerima frame-frame frame-frame tersebut, kemudian tersebut, kemudian melepaskan L2TP, dan memprosesnya sebagai melepaskan L2TP, dan memprosesnya sebagai frame frame incoming incoming PPP biasa. PPP biasa.

5.5. LNS kemudian menggunakan pengesahan PPP untuk LNS kemudian menggunakan pengesahan PPP untuk memvalidasi memvalidasi user user dan kemudian menetapkan alamat IP. dan kemudian menetapkan alamat IP.

Page 31: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

Cara Kerja L2TPCara Kerja L2TP

Komponen-komponen pada tunnel, yaitu :Komponen-komponen pada tunnel, yaitu :Control channelControl channelSessions Sessions (data channel) (data channel) Sessions Sessions (data channel) (data channel)

Page 32: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

Cara kerjanya seperti gambar di Cara kerjanya seperti gambar di bawah ini :bawah ini :

Gambar 6. Cara Kerja L2TP

Page 33: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

IPSecurity (IPSec)IPSecurity (IPSec)

IPSec bekerja dengan tiga cara, yaitu:IPSec bekerja dengan tiga cara, yaitu:Network-to-networkNetwork-to-networkHost-to-networkHost-to-networkHost-to-hostHost-to-host

Page 34: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

Koneksi host-to-network, biasanya digunakan oleh seseorang Koneksi host-to-network, biasanya digunakan oleh seseorang yang menginginkan akses aman terhadap sumberdaya suatu yang menginginkan akses aman terhadap sumberdaya suatu perusahaan. Prinsipnya sama dengan kondisi network-to-perusahaan. Prinsipnya sama dengan kondisi network-to-network, hanya saja salah satu sisi gateway digantikan oleh network, hanya saja salah satu sisi gateway digantikan oleh client, seperti gambar di bawah ini :client, seperti gambar di bawah ini :

Gambar 6. Network-to-network dan Host-to-network

Page 35: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

Protokol yang berjalan Protokol yang berjalan dibelakang IPSec adalah :dibelakang IPSec adalah :

AH (Authentication Header) AH (Authentication Header) ESP (Encapsulated Security Payload) ESP (Encapsulated Security Payload)

Kelebihan mengapa IPSec menjadi standar, yaitu:Kelebihan mengapa IPSec menjadi standar, yaitu: Confidentiality Confidentiality Integrity Integrity Authenticity Authenticity Anti Replay Anti Replay

Page 36: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

VPN works via VPN works via crypto/Encapsulationcrypto/Encapsulation

Page 37: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

Digital Signature to verify data Digital Signature to verify data not changed in transitnot changed in transit

Page 38: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

PKI the full picturePKI the full picture

Page 39: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

WebVPNWebVPN

Page 40: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

WebVPN FeaturesWebVPN Features

Page 41: VIRTUAL PRIVATE NETWORKS (VPN) · PDF file · 2012-10-07transported. Data Integrity – ensuring that the data has not been altered . Encryption Encryption -- is a method of “scrambling”

WebVPN and IPSec WebVPN and IPSec ComparisonComparison


Recommended