Remote Network Access Flashcards
Remote Access Policy
- Restricts access to defined users and groups
- Defined access during days and times
- Access to only parts of network
- Auditing all logons and attempted logons
Tunneling
- Source and destination hosts are on same logical network but connected via different physical networks
PPP
Point-to-Point Protocol
- encapsulation that works at layer 2
- Used for IP packets for transmission over serial digital lines
- no security, so much be used with other protocols to create secure tunnel
GRE
Generic Routing Encapsulation
- Works at layer 3
- Encapsulates IP packet as its payload
- Outer packet is on protocol number 47 and has own IP source and header fields
- Each hop only inspects outer packet to determine forwarding destination
- At final destination, router decapsulates payload and forwards inner destination
- Has no authentication methods so often used with other protocols for VPNs
IPSec
IP Security
- Can be used to secure IPv4 and IPv6 communications on local networks or as a remote access protocol
- Operates on layter 3
- Encrypted packets passing over any network
- Often used with other protocols, but is increasingly used as native VPN protocol
TLS
Transport Layer Security
- Can be used to encapsulate frams and IP packets
- Because it already operates at session layer, inner and outer packets can add overhead
Client to Site VPN
- Allows connection to VPN gateway on edge of local network over public internet
SSL/TLS VPN
- Uses certificates to secure tunnel
- SSTP (Secure Socket Tunneling Protocol) is example
- L2TP ( Layer 2 Tunneling Protocol) also widely used with IPSec
- Require client software to operate
- Most use EAP or AAA/Radius to authenticate users and devices
Split Tunnel
- Client on VPN access internet directly usings its native IP configuration and DNS servces
- Clients browsing uses local internet connection
Full Tunnel
- Internet access is made through corporate tunnel
- Alters clients IP address and may use a proxy
- Offers better securiy, but NATing and DNS operatinos may cause problems with websites and cloud services
- More data is also channeled through tunnel
Remote Host Access
- Operating computer without local terminal
RDP
Remote Desktop Protocol
- Useds to access physical machine on a one-to-one basis
Clientless VPN
- HTML5 VPN
- Allows ordinary browser software to connect to remote desktop or VPN
- Uses Protocol called WebSockets, which enables bidirectional messages to be sent between server and client without overhead of separate HTTP requests
Site-Site VPN
- Configured to operate automatically
- Hosts do not need to be configured with information about VPN
- Also referred to as compulsory tunneling
Hub and Spoke VPN
- Site to site vpn
- Involves multiple remote sites connecting to hub
- VPN router needs to be powerful to handle traffic volumes
- Router referred to as VPN Headend
- They are normally installed in groups for load balancing and fault tolerance
DMVPN
Dynamic Multipoint VPN
- Allows VPNS to be set up dynamically for traffic requirments and demand
- Allows for dynamic mesh topology between remote sites
- Sets up multiple direct vpns, rather than using a hub
- Each sites router is still connected to hub using IPSec tunnel
- Direct VPNs can be negotiated by hub router
- Can be more efficient and reduce jitter and latency
IPsec Policy
- Sets the authetication method and protocols to create secure connection on local network or as remote access
- Each host must be able to match at least one method
- Two main protocols, Authentication Header and Encapsulation Security Payload
AH
Authentication Header
- Performs hash on whole packet, including header plus a shared key and adds secret in header as ICV ( Integrity check value)
- Recipient performs same function to confirm packet has not been modified
- Does not encrypt packet
- Not often used
ESP
Encapsulating Security Payload
- Provided confidentiality authentication and integrity
- Attaches three fields to packet: A header, a trailer (providing padding to cryptographic function) and an integrity check value.
- Unlink AH, ESP excludes the IP Header when calculating the ICV
IKE
Internet Key Exchange Protocol
- Handles authentication and key exchange for things like IPSec
IPSec Transport Mode
- Used to secure communications between hosts on private network
- When ESP is applied, IP Header is not encrypted, just payload data
IPSEC Tunnel Mode
- Used for VPN gate communication
- Whole packet, Header and payload is encrypted with ESP
- Then encapsulated as datagram with new IP Header
RAS
Remote Access Server
- Should be accompanied by documentation describing the uses of the service, security risks and countermeasures and authorized users of the service
Console Port
- Interface for managing appliance
- Requires connection running terminal emulator(like a laptop) using a special cable
- Emulator then uses CLI (command line interface)
AUX Port
- Means to access appliances management interface
- Connects to analog modem and provides access via a dial-up link
- Remote host can connect to appliance CLI using emulators like HyperTerminal or PuTTy
Management Port
- Mean of configuring virtual network interface via one of the normal ethernet ports
- Port must be enabled for management
- Using Telnet or SSH to connect remotely over management interface is referred to as virtual terminal