network access for remote users dr john s. graham ulcc

21
Network Access for Remote Users Dr John S. Graham ULCC [email protected]

Upload: ashlee-holland

Post on 19-Jan-2018

215 views

Category:

Documents


0 download

DESCRIPTION

Site-to-Site Private Infrastructure

TRANSCRIPT

Page 1: Network Access for Remote Users Dr John S. Graham ULCC

Network Access for Remote Users Dr John S. Graham

[email protected]

Page 2: Network Access for Remote Users Dr John S. Graham ULCC

Review of Technologies• Remote Site

– Private Leased Lines• Kilostream or Megastream Circuits• LES

– ISDN– EPS9– ISP

• Remote User– Private Dialup Service– ISP

Page 3: Network Access for Remote Users Dr John S. Graham ULCC

Site-to-Site Private Infrastructure

Page 4: Network Access for Remote Users Dr John S. Graham ULCC

Traditional Dialup Service

High CostsSupport BurdenLimited to 56K Analogue DialupLimited Service

Security Guaranteed

Page 5: Network Access for Remote Users Dr John S. Graham ULCC

Virtual Private Network

Highly Flexible SolutionUses Existing Infrastructure

Complex Security Issues

Page 6: Network Access for Remote Users Dr John S. Graham ULCC

VPN Roadmap

Tunnelling

Sym metric Asymm etric

Encryption

Endpoints Data User

Authentication IP Framew ork

VPN

Page 7: Network Access for Remote Users Dr John S. Graham ULCC

Tunnelling Methods• Layer III

– GRE– IPSec

• Layer II– L2F– PPTP– L2TP

Page 8: Network Access for Remote Users Dr John S. Graham ULCC

Layer 3 Tunnelling (GRE)

TCPIP DataGREIP

GRE

TCPIP Data

passenger protocol

encapsulating protocol

carrier protocol

Page 9: Network Access for Remote Users Dr John S. Graham ULCC

Tunnelling In Action

IP GRE TCPIP Data

Source 62.49.38.138Destination

192.168.17.26194.82.103.186

IP GRE TCPIP Data

192.168.17.26

Page 10: Network Access for Remote Users Dr John S. Graham ULCC

Layer 2 Tunnelling (L2TP)

TCPIP DataL2TPUDPIP PPP

TCPIP DataL2TPUDPIP PPPESP ESP

L2TP

L2TP + IPSec

TCPIP DataPPP

Page 11: Network Access for Remote Users Dr John S. Graham ULCC

Layer 2 Tunnelling Modes

Compulsory L2 Tunnelling

Voluntary L2 Tunnelling

Page 12: Network Access for Remote Users Dr John S. Graham ULCC

Authentication• Peer Identity

– Shared Secret– Digital Certificate

• Data Integrity– Digital Signatures

• User Identity– Kerberos– RADIUS

Page 13: Network Access for Remote Users Dr John S. Graham ULCC

IP Security (IPSec)• Protocols

– Authentication Header– Encapsulating Security Payload– Internet Key Exchange

• Modes– Tunnel– Transport

Page 14: Network Access for Remote Users Dr John S. Graham ULCC

IPSec Protocols

Sequence Number

Authentication Data

SPI

NextHeader

PayloadLength Reserved

Sequence Number

SPI

Authentication Data

Data

NextHeader

PadLengthPad

IV

Authentication Header (51) Encapsulating Security Protocol (50)

Page 15: Network Access for Remote Users Dr John S. Graham ULCC

IPSec ModesTunnel Mode

Transport Mode

IP AH/ESP TCPIP Data

AH/ESP TCPIP Data

Page 16: Network Access for Remote Users Dr John S. Graham ULCC

Equipment at Remote Site

• ‘Wires Only’ ADSL Connection– One Static IP Address

• Splitter• Cisco 827H Router

– Ethernet hub (4 ports) plus ATM port

Page 17: Network Access for Remote Users Dr John S. Graham ULCC

Customer Installation

Page 18: Network Access for Remote Users Dr John S. Graham ULCC

Router Configuration

Routing Table

NAT IPSec

Tunnel

Dialer

A1

A2

B1

B2

B3

Ethernet

Page 19: Network Access for Remote Users Dr John S. Graham ULCC

IPSec Followed by NAT• Immutable fields of outer IP header

included in AH protocol’s ICV data.• Transport mode IPSec renders

TCP/UDP checksums invalid.• Multiple incompatibilities between

SA parameters and NAT.

http://www.ietf.org/internet-drafts/draft-ietf-ipsec-nat-reqts-04.txt

Page 20: Network Access for Remote Users Dr John S. Graham ULCC

Fragmentation Hell

Page 21: Network Access for Remote Users Dr John S. Graham ULCC

http://www.ja.net/documents/