VPN (Virtual Private Network)
VPN can provide for us a secure communication link between such as leased line besides internet.VPN is a Flexible , scalable and Low-cost secure link.
VPN Features :
- Authentication
- Privacy
- Data integrity
- Anti reply
- Intranet VPN
- Extranet VPN
- Access VPN
- Router
- ASA(Adaptive Security Applience )
- Pix Firewall
- VPNconnection
- VPN client
- Modern VPN powerd by IP sec .
- Because of VPN forms a tunnel through a public network , new IP headers must be generated and applied to the packet . this increase the network overhead for this type of connection.
- When Desighning VPN you must choose the appropriate of levels of Encryption ,Authentication & Diffre-Hiffen
- Protect data from the Transport Layer and above .
- IP sec have large advantage than other encryption protocol such as SSH and SSL .
- Encryption Protocol work at Transport layer ans restricted to specific ports .
IP Sec:
It's rule as an architecture and a frame for others VPN protocol .IP sec as a secure architecture use dynamic key exchange that is called Internet Key Exchange (IKE) and IKE calls for a process that called Diffie-Hellman (DH) key exchange .

AH & ESP
Two IP sec core protocol:
- Authentication Header (AH)
- Encapsulation Security Payload (ESP)
| ESP | AH |
Authentication | yes(weak) | yes(strong) |
Message Integrity | yes | yes |
Encyption | yes | No |
Anti reply | yes | No |
------------------------------------------------------------
- AH is the older of the two IP sec core protocol .it supports only authentication and data integrity features .
- Encrypt
- Decrypt
IP packet + key =Encrypted Data
VPN encryption :
the widely supported hashing algoritm are used :
DH (Deffie-Hellman) :
The goog of DH algorithm is to give devices a way to security exchanges the shared key over a public network .
SSL:
- DES : Data Encryption Standard (56 bit)
- 3 DES : 3*56 bit
- AES : Advanced Encryption Standard
- AES currently offers the strongest level of encryption possible for symmetric encryption . it can reach up to 256 bit encryption .
the widely supported hashing algoritm are used :
- MD5(Message Digital 5)
- Secure Hash Algoritm (SH-1)
- Hashing features pass data through a mathematical algorithm to generate a hash for data integrity nn
DH (Deffie-Hellman) :
The goog of DH algorithm is to give devices a way to security exchanges the shared key over a public network .
- DH1 : 768 bit
- DH2 : 1024 bit
- H3 : 1536 bit
SSL:
SSL :Secure Socket Layer: SSL encrypt the segments of network connections at the Transport Layer end-to-end.
Several versions of the protocols are in wide-spread use in applications like web browsing, electronic mail, Internet faxing, instant messaging and voice-over-IP (VoIP).(Wikipediya)
To support SSL vpm connection you need a router or cisco ASA that be configured with SSL VPN and the client can connect using standard web browser.SSL use port 443.(SSL is a transport layer protocol)
Cisco introduce web VPN server acts as a web server can be implemented by many devices including as ASA . this connection uses SSL for all communication.
SSL VPN types :
- Clientless :Doesn't allow user to use application on their PC over the VPN
- Thin Client : Install Activex or Java based plugins after the user has successfully authenticated to the VPN . this plugin allow user to use application (only TCP based application ). CISCO released a new implemention called "CISCO Secure Desktop".
No comments:
Post a Comment