VPN? VPN VPN Tunneling L2F PPTP L2tp IPSEC IKE -2 -

Similar documents
歯III-2_VPN-김이한.PDF

Subnet Address Internet Network G Network Network class B networ

SMB_ICMP_UDP(huichang).PDF

歯이시홍).PDF

UDP Flooding Attack 공격과 방어

TTA Verified : HomeGateway :, : (NEtwork Testing Team)

PowerPoint Template

歯I-3_무선통신기반차세대망-조동호.PDF

TCP.IP.ppt

PWR PWR HDD HDD USB USB Quick Network Setup Guide xdsl/cable Modem PC DVR 1~3 1.. DVR DVR IP xdsl Cable xdsl Cable PC PC DDNS (

05 암호개론 (2)

歯김병철.PDF

슬라이드 1

1217 WebTrafMon II

USB USB DV25 DV25 REC SRN-475S REC SRN-475S LAN POWER LAN POWER Quick Network Setup Guide xdsl/cable Modem PC DVR 1~3 1.. DVR DVR IP xdsl Cable xdsl C

네트워크 안정성을 지켜줄 최고의 기술과 성능 TrusGuard는 국내 최초의 통합보안솔루션으로서 지난 5년간 약 4천여 고객 사이트에 구축 운영되면서 기술의 안정성과 성능면에서 철저한 시장 검증을 거쳤습니다. 또한 TrusGuard는 단독 기능 또는 복합 기능 구동 시

歯A1.1함진호.ppt

DBPIA-NURIMEDIA

Chapter11OSPF

chapter4

歯규격(안).PDF

1.LAN의 특징과 각종 방식

Network seminar.key

SLA QoS

°í¼®ÁÖ Ãâ·Â

Sena Device Server Serial/IP TM Version

슬라이드 제목 없음

Ⅰ. 들어가는 말 2005년 6월에 발생한 인터넷뱅킹 해킹 사건이 2005년 가장 기억에 남는 정보보호 뉴 스로 선정되었다고 한다. 해킹 등으로 인해 개인의 PC가 악의적인 해커에 의해 장악이 된 경우에는 어떤 보안시스템도 제 기능을 다하지 못함에도 불구하고, 해킹 사

PCServerMgmt7

본 해설서는 정보통신망 이용촉진 및 정보보호 등에 관한 법률 (이하 법 이라 한다) 제28조제1항과 같은 법 시행령 제15조제6항에 근거한 개인정보의 기술적 관리적 보호조치 기준 이 개정 고시( )됨에 따라 - 동 기준의 각 조항별 주안점과 구체적인 사례를

제20회_해킹방지워크샵_(이재석)

Voice Portal using Oracle 9i AS Wireless

록들 Hl, 53l f크 c>c> 동성정보릉선(주) 빼빼빼빼빼 廳 빼빼 :줬했 :~:::::::::::: 텔레뱅킹 ; 음성 쩔훌F 싼섣섣섣1 온앵서버 홈뱅 킹 PC 모덤 i..",.q));;,"ss-=- PC 뱅킹 폈 도듣] 스크린폰 ; 흠칭 ;될01 -

bn2019_2

Microsoft PowerPoint - ch02_인터넷 이해와 활용.ppt

Backup Exec


6강.hwp

untitled


ecorp-프로젝트제안서작성실무(양식3)

Microsoft Word doc


PBNM CIM(Common Information Model) DEN, COPS LDAP 21 CIM (Common Information Model) CIM, specification schema [7]

rv 브로슈어 국문

SRC PLUS 제어기 MANUAL

○ 제2조 정의에서 기간통신역무의 정의와 EU의 전자커뮤니케이션서비스 정의의 차이점은

1. 정보보호 개요

public key private key Encryption Algorithm Decryption Algorithm 1

ARMBOOT 1

BJFHOMINQJPS.hwp

< FC1A4BAB8B9FDC7D D325FC3D6C1BEBABB2E687770>

Contents I. Softswitch 정의 II. 통신망구조 III. Softswitch 망구조 IV. Softswitch Protocol V. Softswitch Model VI. 서비스구조 VII. 발전방향 2

歯연보00-5.PDF

Analyst Briefing

solution map_....

0125_ 워크샵 발표자료_완성.key

Cisco SDN 3.0 DDoS DDoS Cisco DDoS Real Demo 2008 Cisco Systems, Inc. All rights reserved. 2

PowerPoint 프레젠테이션

04-3G 이동통신망의 multimedia(임병근).ppt

Windows 네트워크 사용 설명서

Mstage.PDF

歯김한석.PDF


Microsoft PowerPoint - MobileIPv6_김재철.ppt

Remote UI Guide

IPv6Q 현배경 > 인터넷의급속한성장 -> IP 주소의고갈 개인휴대통신장치의보급 network TV, VOD 단말기등의인터넷연결 가정용품제어장치의인터넷연결 > 새로운 IP 로의이행문제 IPv4 호스트와의호환성문제를고려하여야합 ~ IPv4 의취약점보완 QoS 지원 인증

Multi Channel Analysis. Multi Channel Analytics :!! - (Ad network ) Report! -! -!. Valuepotion Multi Channel Analytics! (1) Install! (2) 3 (4 ~ 6 Page

OUR INSIGHT. YOUR FUTURE. Disclaimer Presentation ( ),. Presentation,..,,,,, (E).,,., Presentation,., Representative.( ). ( ).

Interstage5 SOAP서비스 설정 가이드

FMX M JPG 15MB 320x240 30fps, 160Kbps 11MB View operation,, seek seek Random Access Average Read Sequential Read 12 FMX () 2

untitled

AGENDA 모바일 산업의 환경변화 모바일 클라우드 서비스의 등장 모바일 클라우드 서비스 융합사례

歯주간-wrv7n15.PDF

APOGEE Insight_KR_Base_3P11

PowerPoint 프레젠테이션

DW 개요.PDF

歯박사


Assign an IP Address and Access the Video Stream - Installation Guide

Microsoft PowerPoint - 06-IPAddress [호환 모드]

Portal_9iAS.ppt [읽기 전용]

untitled

untitled

미래인터넷과 창조경제에 관한 제언 65 초록 과학기술과의 융합을 통해 창조경제를 이루는 근간인 인터넷은 현재 새로운 혁신적 인터넷, 곧 미래인터넷으로 진화하는 길목에 있다. 창조와 창업 정신으로 무장하여 미래인터넷 실현에 범국가적으로 매진하는 것이 창조경제 구현의 지름

PowerPoint 프레젠테이션

DBPIA-NURIMEDIA


hwp

Web Application Hosting in the AWS Cloud Contents 개요 가용성과 확장성이 높은 웹 호스팅은 복잡하고 비용이 많이 드는 사업이 될 수 있습니다. 전통적인 웹 확장 아키텍처는 높은 수준의 안정성을 보장하기 위해 복잡한 솔루션으로 구현

<%DOC NAME%> (User Manual)

CD-RW_Advanced.PDF

슬라이드 제목 없음

<30362E20C6EDC1FD2DB0EDBFB5B4EBB4D420BCF6C1A42E687770>

자바-11장N'1-502

발표순서 v 기술의배경 v 기술의구조와특징 v 기술의장, 단점 v 기타사항 v MOFI 적용방안 2 Data Communications Lab.

Network of Networks l RingNet l 02 안녕하십니까? 링네트 대표이사 입니다. 링네트는 SI/NI 컨설팅, 설치, 유지보수, Security, IP Telephony, 모바일 네트워크, 서버, 스토리지, 가상화 등 Cloud 사업을 통해 더 빠르

istay

歯V-2_VoIP와지능망-홍융기.PDF

슬라이드 1

Transcription:

VPN ( )

VPN? VPN VPN Tunneling L2F PPTP L2tp IPSEC IKE -2 -

VPN Virtual Private Network : Extranet Intranet -3 -

-4 -

, network network network network, -5 -

Network interactive (, ) contents hosting, -6 -

, (,, ) (resource) QoS (best-effort), QoS,, (Leased Line), VPN +, -7 -

WAN network Leased Line, FrameRelay intranet -8 -

(VPN) ISP ISP ISP POP network, QoS pop : points of presence ISP -9 -

VPN, mobile user, telecommuter, extranet - 10 -

VPN ( ) - 11 -

intranet VPN : LAN. Extranet VPN : Intranet VPN Remote Access VPN. Remote Access VPN : ISP. - 12 -

- 13 -

DATA Key management LAN to LAN Dial-up to LAN VPN IPSec(IP Security) Tunnel Endpoints Transit Internetwork Header Payload Transit Internetwork Tunnel Payload Tunneled Payload - 14 -

VPN server Router firewall VPN client, - checkpoint, radguard, vpnet, shiva router access server VPN router VPN point-to-point tunneling - router cisco, shiva, intel,... firewall VPN bottleneck checkpoint,, - 15 -

VPN Remote Access VPN PSTN, ISDN, DSL, Cable Modem... LAN to LAN VPN(Site-to-site VPN) LAN to LAN VPN LAN to Client VPN ISP VPN - 16 -

Mobile Worker, Telecommuter, Client Initiated VPN PC QoS NAS( Network Access Server) Initiated VPN ISP - 17 -

Client Initiated VPN PC VPN S/W server(gateway) tunnel public IP public IP : internet private IP : network : VPN S/W, upgrade Tunneling IPSec PPTP, L2TP - 18 -

Client Initiated VPN - 19 -

NAS Initiated VPN ISP NAS(Network Access Server) server(gateway) tunnel NAS VPN private IP internet, network client VPN s/w Tunneling L2TP, L2F cisco, Lucent, 3Com - 20 -

NAS Initiated VPN - 21 -

network network IP VPN CPE based VPN site VPN Core based VPN ISP VPN MPLS * CPE : Customer Promise Equipment - 22 -

CPE based VPN VPN Microsoft, Novell, Checkpoint, VPNet, Lucent, Cisco, 3Com, CPE VPN ISP VPN management network manage Firewall manage VPN manage Tunneling IPSec - 23 -

CPE based VPN - 24 -

Core based VPN ISP (Router..) VPN VPN Core network QoS Service Management Tunneling IPSec MPLS - 25 -

Core based VPN MPLS (Multi-Protocol Label Switching) Cisco Tag switching ATM, FrameRelay Label packet forwarding load Traffic Engineering QoS service - 26 -

Core based VPN - 27 -

LAN to LAN VPN VLL(Virtual Leased Line) Remote Authentication Dial-in User Service (RADIUS) - 28 -

LAN to Client VPN PC VPN RAS - 29 -

ISP VPN ISP VPN - 30 -

- 31 -

Tunneling point-to-point tunnel Security Quality of Services Leased Line, FR Bandwidth - 32 -

Tunneling Layer2 L2F(layer 2 Forwarding) PPTP(Point-to-Point Tunneling Protocol) L2TP(Layer 2 Tunneling Protocol) Layer 3 IPSEC(Internet Protocol Security) ATMP(Ascend Tunnel Management Protocol) VTP(Virtual Tunneling Protocol) - 33 -

Tunneling - 34 -

Security authentication( ) Integrity( ) encryption( ) DES (Data Encryption Standard) : CPU intensive 3DES RC5 MPPE - 35 -

Quality of Service(QoS) Bandwidth RSVP : cisco CR-LDP : nortel diffserv (Differentiated Service) RFC 2474 RFC 2475-36 -

L2F(Layer 2 Forwarding) Cisco, Nortel, Shiva ISP server tunnel server L2F tunnel direct-dial PPP/RAS home site home site gateway server domain ID FrameRelay ATM (tunneling IP ) PPP(point-to-point) : TACACSA+, RADIUS - 37 -

- 38 -

L2F(Layer 2 Forwarding) - 39 -

L2F Flow (PPP authentication) - 40 -

L2F Tunnel Authentication - 41 -

Frame - 42 -

PPTP ( Point-to-Point Tunneling Protocol) 3COM, Microsoft, Ascend, US Robotics first popular tunneling standard, PPP Client/Server Windows 95 Windows NT 4.0 Mobile user home site Allows you to tunnel or encapsulate IPX and NetBEUI packets in a standard TCP/IP dial-up connection or a dedicated Internet connection PPTP uses the security policy you already have set up on the network Over 90 million PCs are PPTP-enabled--unlike other protocols - 43 -

Bi-directional Tunnel Two mode client enabled ISP enabled Non IP protocol : IPX, Appletalk PAP, CHAP, MS-CHAP RC4(40bits/128bits) Microsoft dependent (Windows NT ) RAS vendor - 44 -

L2TP : Layer2 Tunneling Protocol remote LAC(L2TP Access Server) Home gateway LNS(L2TP Network Server) remote access cost overhead flexibility scalability client initiated VPN - 45 -

Hybrid of L2F and PPTP Emerging standard for VPN tunneling Multiple protocol : IP, IPX, AppleTalk non-ip network LAN-to-LAN VPN WAN : X.25, ATM, Frame Relay, SONET network traffic flow control : server congestion handling ( netw ork access system home gateway ) LAC (L2TP Access Concentrator) ISP NAS LNS (L2TP Network Server) edge (router, firewall) - 46 -

L2TP Tunnel Structure - 47 -

L2TP Incomming Call Flow emote user ISP PPP. SP Network LAC POP PPP Link nd User LNS LCP Negotiation LAC CHAP PAP End User Authentication ser name, Domain name User VPDN client User VPDN Client Client Access. VPDN client user name End Point mapping The LNS ) unnel End Point LAC LNS Session Tunnel. unnel L2TP Session End User. AC LCP CAHP/PAP Authentication LNS - 48 -

2 Message Type ( ) - Control message : Establish, Maintenance, Clearing. L2TP Control Channel - Data message : Encapsulation PPP. Packet Loss Retransmit. 0 L2TP 32 T L X X S X O P X X X X Ver Tunnel ID Ns (opt) Offset size(opt) Length(opt) Session ID Nr (opt) Offset size(opt) - 49 -

- - T bit: Message. 0 Data message 1 Control message -L bit : 1 Length. Control message 1. - X bit : - S bit : 1 Ns Nr. Control message 1. - O bit : 1 Offset. Control message 0. - P bit : 1 Data message Local queuing. Data message. Control message 0 - Ver : 2 L2TP 1 L2F - Length : Message - Tunnel ID : Control Connection ID - Session ID : Session ID - Ns : Data Control Message Sequence Number. 0 2 16 1 -Nr: Control message Sequence Number. 0 2 16 1 - Offset : Payload. 0 32 T L X X S X O P X X X X Ver Tunnel ID Ns (opt) Offset size(opt) L2TP - 50 - Length(opt) Session ID Nr (opt) Offset size(opt)

L2F/L2TP opertation - 51 -

PPTP L2TP Media IP GRE PPP PPP Payload draft-ietf-pppext-pptp-07.txt Media IP L2TP L2TP Payload draft-ietf-pppext-l2tp-12.txt - 52 -

IETF IPSec working Group VPN tunneling layer 3 IPv6 Non-IPSec protocol Authentication Header(AH) protocol : Packet Payload Encrypt. Encapsulating Security Payload(ESP) protocol : Fully Encrypt Overload Encryption Algorithms DES(Data Encryt Standards), 3DES, RC5 Authentication Algorithms MD(Message Digest )5->128bit, SHA(Secure Hash Algorithm)1->160 bit IKE - 53 -

(Authentication Header) ESP(Encapsulation Security Payload) IP (Security Association) - 54 -

Enables transmission of sensitive information over unprotected networks such as the Internet IPSec (Confidentiality): packets encrypted before transmission (Integrity): authenticates packets at the destination peer to ensure that data has not been tampered during transmission (Authentication): peers authenticate source of all IPSEC protected packets (Anti-replay): prevents capture and replay of packets - 55 -

. IPSec. IPSec RFC RFC 1825 : Security Architecture for the Internet Protocol RFC 1826 : IP Authentication Header RFC 1827 : IP Encapsulating Security Payload (ESP) RFC 1828 : IP Authentication Using Keyed MD5 (Message Digest) RFC 1829 : The ESP DES-CBC Transform RFC 2085 : HMAC-MD5 IP Authentication with Replay Prevention RFC 2104 : HMAC: Keyed-Hashing for Message Authentication - 56 -

AH - Authentication Header IP datagram authentication, integrity data integrity, data origin authentication, optional Anti-replay protection : RFC 2402 inserted after the IP header and before any upper layer headers (integrity) MD5,SHA-1 message checksum IP (secret shared key) Replay AH header sequence number - 57 -

IP Payload IP IP AH Payload AH IP IP AH Payload Next Payload (16 bits) Security Parameter Index (SPI) (32 bits) Sequence Number (32 bits) Authentication Data ( ) 32 bits - 58 -

IP Payload IP IP IP Payload IP IP AH IP Payload AH IP - 59 -

ESP - Encapsulating Security Payload Payload Encrypt -> AH Overhead IP datagram confidentiality, integrity data confidentiality optional data integrity, peer authentication, anti-replay protection : RFC 2406 Inserted after the IP header and before any upper layer headers DES(Data Eecrytion Standard, 53bit)/3DES IP packet : Replay sequence number - 60 -

IP ESP Payload ESP tail ESP Auth Authentication Encryption Security Parameter Index Sequence Number Payload Data ( ) Padding (0~255 bytes) Pad Next Authentication Data ( ) 32 bits - 61 -

IP Payload IP IP IP Payload IP IP ESP IP Payload ESP tail ESP Auth Encrypted Authenticated - 62 -

Transport Mode IP payload Encrypt original IP header. byte. Public network device Source/Destination. QoS Processing. IP header clear 4 Traffic. AH-transfer mode IP header AH IP payload Authenticated except for mutable fields in IP header ESP-transfer mode IP header ESP header IP payload ESP trailer ESP auth Encrypted Authenticated - 63 -

Tunnel Mode Original IP datagram Encrypt New IP Payload. Router Ipsec proxy Router Hosts Encryption Source Router Encrypt Ipsec Forwarding. Destination Router. End system Ipsec modyfi. Traffic. AH-tunnel mode New IP header AH IP header IP payload Authenticated except for mutable fields in New IP header ESP-tunnel mode New IP header ESP header IP header IP payload ESP trailer ESP auth Encrypted Authenticated - 64 -

Transport Mode Tunnel Mode - 65 -

Transport Mode Tunnel Mode IP Hdr AH TCP Hdr Data Authenticated Outer Original IP Hdr AH Inner IP Hdr TCP Hdr Data Authenticated IP Hdr ESP TCP Hdr Data Authenticated Encrypted Outer Original IP Hdr ESP Inner IP Hdr TCP Hdr Data Authenticated Encrypted IP Hdr AH ESP TCP Hdr Data Authenticated Encrypted - 66 -

1472 1472 ESP : host AH : secure gateway Host A Secure gateway 1 Secure gateway 2 Host B IPSEC Authentication only Encryption and authentication IPSEC Between Host A and Secure gateway 1 IP header ESP header Payload ESP trailer ESP auth etween two ecure gateways New IP header AH IP header ESP header Payload ESP trailer ESP auth etween Host B and ecure gateway 2 IP header ESP header Payload ESP trailer ESP auth AH Added ESP applied packet - 67 -

IPSec IP Certificate Authority Non-IPSec VPN VPN L2F, L2TP, PPTP, SOCKS - 68 -

( ) VPN LAN-to-LAN VPN Dialup-to-LAN VPN IPv6 Non-IPSec - 69 -

Security association(sa) nego : protocol,, key key SA under IPSEC specifies next things the mode of the authentication algorithm used in AH and the keys to that authentication algorithm the ESP encryption algorithm mode and the keys to that encryption algorithm. the presence and size of(or absence of) any cryptographic synchronization to be used in that encryption algorithm. how you authenticate your communications(using what protocol, what encrypting algorithm, and what key). how you make your communication private(what algorithm, and what key). how often those keys are to be changed. the authentication algorithm mode, and transform for use in ESP plus the keys to be used by that algorithm. the key lifetimes. the lifetime of the SA itself. - 70 -

SA VPN SA SPI SA : SPI : SA unique number(32bit), AH /ESP header - 71 -

Internet Key Exchange (IKE) a powerful, flexible negotiation protocol that allows users to agree on authentication methods, encryption methods, the keys to use, how long to use the keys before changing them, and that allows smart, secure key exchange key : Diffie-Helman Strong data encryption requires frequent key change Phase I - IKE peer secure channel Phase II - peer SA negotiation Dynamically exchanges keys for bulk data encryption - 72 -

Internet Key Exchange (IKE) - 73 -

Internet Key Exchange (IKE) Coupled with IPSec s key management systems Employed to exchange information used to generate encryption key Agrees on encryption and data authentication algorithms Each participant has pair of keys; one private and one public. Digital signatures supplied by a Certificate Authority. This is a Top Secret Message for ACME Customers The Customers Data + + The Encryption Operation (e.g. DES) The Key = The Encrypted Data - 74 -

Encrypted communication Transmitted sender Ciphertext plaintext Encryption Decryption receiver plaintext Encryption Key Secret key public key Decryption Key secret key single key, encryption key decryption key symmetric key, N N key public key a pair of keys, public key private key asymmetric key - 75 -

Secret key -> Private Enterprise Network DES(Data Encryption Standard) Triple-DES IDEA, Blowfish, CAST-128 DES block cipher : 64bit plaintext ==> 64bit ciphertext key length = 56 bits 16 permutation( ) of secret key Triple-DES DES 3 key length = 56bit * 3 = 168 bits - 76 -

DES 3-DES DES : brute-force attack, plaintext resource 3-DES : brute-force attack computer system Transmitted sender Ciphertext plaintext Encryption Decryption receiver plaintext Secret Key Secret Key - 77 -

Public key RSA(Rivest-Shamir-Adleman) system 2 key (Public key, Private key) Public key :, Private key : receiver,, Transmitted sender Ciphertext plaintext Encryption Decryption receiver plaintext Receiver s Public Key Receiver s Private Key - 78 -

Public key -> CPU load secret key key digital signature application encryption : sender : receiver public key receiver: receiver private key authentication : sender : sender private key everyone : sender public key - 79 -

PKI :,,, PKI - 80 -