Notes - MIECT
Segurança Em Redes De Comunicações
Notes - MIECT
Segurança Em Redes De Comunicações
  • Segurança Em Redes De Comunicações
  • Corporate Networks Topics
    • Objectives of Network Design
    • Equipments
    • Hierarchical Network Model
    • Modular Network Design
    • Designing the Access Layer
    • Designing the Core Layer
    • Virtual LANs
      • VLANs on Access Points
    • Spanning Tree Protocol
    • IP Routing Overview
  • Introduction to Network Security
    • Type of Attacks
    • Attacks Phases
      • Infiltration Phase
      • Propagation Phase
      • Aggregation and Exfiltration Phase
    • Defenses
    • Security Metrics
  • Network Access Control
    • AAA Architecture
      • TACACS+
      • RADIUS
      • DIAMETER
    • IEEE 802.11 services
    • Joining a BSS
      • WLAN Frames
      • Joining BSS with AP
    • WPA and 802.11i (WPA2)
  • Network Flow Control
    • Network Security Systems
    • Firewalls
    • High-Availability
    • Load Balancing Firewall Load
    • Best Practices and Recommendations
    • IP Spoofing
    • Half-Open TCP Connection Problem
    • DDoS Mitigation at Source
    • Cisco’s Access Control Lists (ACL)
    • Linux IPTables
    • Control By Analysis of Higher Layers
  • Secure Communications
    • Public Key Infrastructure (PKI)
    • X.509 Certificate Contents
    • Traffic Tunnel Concept
      • Next Hop Resolution Protocol (NHRP)
      • Hub-Spoke vs. Spoke-Spoke
    • IPSec
    • Establishing SA and Cryptographic Keys
    • Virtual Private Networks (VPN)
    • Management of Asymmetric Keys
  • Remote Access
    • Remote Access
    • IPsec NAT Transversal
    • Integration with Flow Control
  • Intrusion Detection and Prevention
    • Intrusion Detection and Prevention
    • Host-Based vs. Network-Based
    • Signature vs. Anomaly Based
    • Network Deployment
  • Network Monitoring SIEM
    • Core and End-to-End Monitoring
    • Node Monitoring
    • End-User/Host/App Monitoring
    • Server/Service/Cloud Monitoring
    • Per-Service Detailed Monitoring
    • Data Sources
      • SNMP
      • NetFlow
    • Network Passive Probing Packet Capturing
    • Remote CLI Access
    • Log Files Access
      • Log Management Systems (LMS)
      • Security Information and Events Management (SIEM)
Powered by GitBook
On this page
  • Types
  • PPTP VPN
  • L2TP/IPSec VPN
  • Other types
  • Variants of Site-to-Site IPsec VPN
  • Dynamic Multipoint VPN
  • SD-WAN
  1. Secure Communications

Virtual Private Networks (VPN)

PreviousEstablishing SA and Cryptographic KeysNextRemote Access

Last updated 2 years ago

Is an encrypted connection between private networks over a public network.

Types

Remote Access VPN.

  • PPTP.

  • L2TP/IPsec.

  • SSL/TLS VPN.

    • Web VPN (client-less SSL VPN) – VPN client can be a standard browser.

  • SSH VPN.

  • Open VPN.

Site-to-Site VPN.

  • IPsec VPN.

    • With static or dynamic configuration.

  • IPsec + GRE VPN.

    • Dynamic Multipoint VPN.

PPTP VPN

Based on PPTP.

  • PPTP packages data within PPP packets.

  • Encapsulates the PPP packets within IP packets.

Uses a form of General Routing Encapsulation (GRE) to get data to and from its final destination.

Supports authentication based on protocols PAP, EAP, CHAP, MS- CHAPv1, and MS-CHAPv2.

Uses MPPE as a cipher.

  • Has two different keys (one for each direction).

  • Requires MS-CHAPv2 authentication.

  • Keys derived from the MS-CHAPv2's password hash and challenges.

PPTP creates a TCP control connection between the VPN client and the VPN server to establish a tunnel.

  • Uses TCP port 1723 for these connections.

PPTP can support only one tunnel at a time for each user.

L2TP/IPSec VPN

Authentication can be performed with Digital Certificates (RSA) or with the same PPP authentication mechanisms as PPTP.

Provides data integrity, authentication of origin, and replay protection.

Encryption is provided by IPSec (ESP protocol).

Can support multiple, simultaneous tunnels for each user.

Slower performance than PPTP.

Other types

SSL/TLS VPN.

  • SSL/TLS protocol handles the VPN tunnel creation.

  • SSL/TLS is much easier to implement than IPSec and provides a simple and well-tested platform.

  • RSA handshake (or DH) is used exactly as IKE in IPSec.

SSH VPN.

  • VPN over an SSH connection.

  • SSH tunneling - port forwarding.

OpenVPN.

  • Implements an SSL/TLS VPN.

  • Allows PSK, certificate, and login/password-based authentication.

  • Encryption provided by OpenSSL (can use all ciphers available).

  • Compatible with dynamic and NAT addresses.

Variants of Site-to-Site IPsec VPN

IPsec tunnels with static configuration.

  • Requires the knowledge of all peers (IP addresses and security parameters).

  • High configuration overhead.

IPsec tunnels with dynamic configuration (at the headend/hub).

  • Hub + spokes configuration.

  • Generic configuration at the headend/hub.

  • Easy to add new spokes

  • A basic IPsec tunnel can't protect multicast traffic.

IPsec + GRE tunnels.

  • Generic Routing Encapsulation (GRE) allows the protection of multicast traffic over IPsec.

Dynamic Multipoint VPN (DMVPN).

Dynamic Multipoint VPN

Relies on NHRP to create an overlay network.

Provides full meshed connectivity with a simple configuration of the hub and spoke.

Supports dynamically addressed spokes.

Facilitates zero-touch configuration for the addition of new spokes.

Features automatic IPsec triggering for building an IPsec tunnel.

SD-WAN

Software Defined WAN.

  • Edge Connectivity Abstraction.

  • WAN Virtualization.

  • Policy-Driven, Centralized Management.

  • Elastic Traffic Management.

  • Advantages: Easy deployment and management.

  • Disadvantages: Completely dependence (present and future) on external providers.

Remote Access VPN
Site-to-Site VPN