VPN Concept
VPN Concept
Type of VPNs:
There are two main types or categories of VPNs, Site-to-Site VPNs and Remote-Access VPNs.
Remote-Access VPNs:
o Enable users to work from remote locations such as their homes & other premises.
o Remote-Access VPNs connect client devices to LAN over the Internet infrastructure.
o Individual hosts or clients, access a company network securely over the Internet.
o Each host typically has VPN client software loaded or uses a web-based client.
o Whenever the host send any information, the VPN client software encapsulates it.
o Whenever the host send any information, the VPN client software also encrypts it.
o It allows individual users to establish secure connections with a remote network.
o Remote-Access VPN tunnels are formed between a VPN device & an end-user PC.
o The remote user requires the Cisco Virtual Private Network (VPN) client software.
o Remote access Virtual Private Network connect individual users to private networks.
o Remote-access Virtual Private Network connects individual host to company Network.
IPSec Features:
Confidentiality:
o By encrypting data, nobody except the sender & receiver will be able to read the data.
o Encryption algorithms protect data so it cannot be read by a third party while in transit.
o It mean the data will keep as secret using encryption algorithm Like DES, 3DES, AES.
Integrity:
o IPSec Integrity provide to make sure that nobody changes the data in packets.
o Receiver can authenticate packets sent by sender to ensure data has not been altered.
o By calculating hash value, the sender & receiver will be able to check data is not alerted.
o IPSec integrity insure that data has not been altered during transmission.
o IPSec Integrity using hash algorithm such as MD5 and SHA.
Authentication:
o Authentication means both devices will authenticate each other before data exchange.
o Authentication algorithms verify the data integrity and authenticity of a message.
o IPSec Authentication using Pre-Shared or Certificate (PKI) to authenticate peer.
o The IPSec receiver can authenticate the source of the IPSec packets sent.
o IPSec Authentication make sure that we are really talking with the device we intend to.
Anti-Replay:
o Attacker could try to capture these packets & send them again.
o Each packet is unique, has not been duplicated or intercepted.
o By using sequence numbers, IPsec will not transmit any duplicate packets.
o It means that if the data arrive late it will consider as alter & it will be drop.
Transport Mode:
o IPSec only encrypts and/or authenticates the actual payload of the packet.
o In Transport mode, the header information remains unchanged.
o IPSec Transport mode is used for end-to-end communications.
o IPSec Transport mode is used for communication between client & server.
o IPSec Transport mode is used for communication between a workstation.
o Normally, encrypted Telnet or RDP session from workstation to server.
o IPSec Transport mode protect Layer 4 and upper Layer data.
o IPSec Transport Mode will use the original IP header.
o IPSec transport mode is used when another tunneling protocol like GRE is used.
o IPSec Transport Mode is used in Dynamic Multipoint Virtual Private Network.
SHA Hashing:
o SHA, stands for Secure Hash Algorithm, is cryptographic hashing.
o SHA used to determine the integrity of a particular piece of data.
o The Secure Hashing Algorithm comes in several flavors.
o SHA-1 and SHA-2 are two different versions of that algorithm.
o SHA1 produces a 160-bit (20-byte) hash value.
o SHA2 has option to vary digest between 224 bits to 512 bits.
o SHA224 produces a 224-bit (28-byte) hash value.
o SHA256 produces a 256-bit (32-byte) hash value.
o SHA384 produces a 384-bit (48-byte) hash value.
o SHA512 produces a 512-bit (64-byte) hash value.
IPSec Encryption:
IPSec provide many Encryption methods mostly used are DES, 3DES & AES.
DES Encryption Algorithm:
o DES stands for Data Encryption Standard, its Encryption Algorithm.
o DES was developed by IBM in 1970s but was later adopted by the NIST.
o DES (Data Encryption Standard) key length is 56 bits & block size is 64-bit length.
o Data Encryption Standard uses 56-bit key, ensuring high-performance encryption.
o DES is not a secure encryption algorithm and it was cracked many times.
o DES is one of the most widely accepted, publicly available cryptographic systems.
o DES (Data Encryption Standard) is used to encrypt and decrypt packet data.
o DES turns clear text into ciphertext with an encryption algorithm.
o The decryption algorithm on the remote end restores clear text from ciphertext.
o DES shared secret keys enable the encryption and decryption on both sides.
o DES (Data Encryption Standard) is the weakest of the three algorithms.