Remote Access - York Technical College
Download
Report
Transcript Remote Access - York Technical College
Remote Access
Lecture 2
Security Protocols
IPSec
L2TP - Layer 2 Tunneling Protocol
SSL – Secure Socket Layers
Kerberos
SSH – Secure Shell
RADIUS – Remote Authentication Dialin Service
Encryption
Process of encoding data using a mathematical
algorithm that makes it difficult for unauthorized
users to read the data if they intercept it.
Encryption requires a key (math. Algorithm) to read
the data.
Two types of encryption
Symmetric – same key is used to encrypt/decrypt
Asymmetric – two keys – public key encrypts the message;
the private key decrypts.
Key – binary number made up of a large number of
bits
56 bit encryption – 256
128 bit encryption – 2 128 - used online
IPSec
LANs or WANs using TCP/IP only
Encrypts data
Provides
Verification – data is from intended source
Protection – an intermediary did not alter the
message
Privacy – unreadable by others
Operates at the network layer
Security operates at the higher layers
PPTP
Point to Point Tunneling Protocol
Dial-up
Provides secure tunnel
Other connectivity protocols like PPP can be
used inside the tunnel
PPTP control connection – between client
IP and server IP - created using TCP
Uses port 1723
L2F
Cisco proprietary protocol
Permits tunneling over insecure
networks
L2TP – Layer 2 Tunneling
Combination of PPTP and L2F
Two phase process
Operates at Layer 2
Protocol independent
Will not work with NAT
Requires digital certificate
Authenticates computer
Authenticates user
key attached to the message
Offers greater security than PPTP
SSL
Used on the Internet – HTTPS (port 443)
Three services
Server authentication
Client authentication
Client verifies server identity
Server verifies client identity
Encrypted Connection
Uses public key encryption
Kerberos
Provides client/server applications
w/authentication
Server and clients must prove identities
to one another
Each communicating party is issued a
“ticket” which is embedded in messages
and used to identify the user
Open source
SSH - Secure Shell
Secure replacement for Telnet
Entire session is encrypted
Provides interoperability between
LINUX
UNIX
Windows 9x/NT/200x
Macintosh
Freeware:
PuTTY
ICA – Independent Computing
Architecture
Allows clients to access and run
applications on a server using the
server’s resources. (dumb terminal)
Thin client – only a small piece of
software is needed on the client
system.
Platform independent
Example: Citrix
RADIUS – Remote Auth. Dialin User Service
Client/server protocol
Consists of
Central server
Database
Authentication – using PAP or CHAP – identifies users
Authorization – gives users’ access
Accounting – tracks user accesses, failed attempts,
time, etc.
One or more dial-in servers
Central
server has
database to
determine
user
RADIUS
RADIUS
Central
Server
RAS 1
Client dials in; could hit
remote access server 1 or 2
RAS 2
Types of Access
Dial-up
VPN
Modem to modem
Authentication
All O/S support
Provides low-cost (as compared to leased line) secure network
connection
Point to point dedicated link over a public IP network
Creates a connection between two computers
Uses PPP
VPN Sessions
VPN client initiates connection to server
Server authenticates VPN clients
Protocols – PPTP or L2TP