De presentatie wordt gedownload. Even geduld aub

De presentatie wordt gedownload. Even geduld aub

hcc!pc Werkgroep netwerken

Verwante presentaties


Presentatie over: "hcc!pc Werkgroep netwerken"— Transcript van de presentatie:

1 hcc!pc Werkgroep netwerken
Internet Workshop VPN Door : Gerben Wubs

2 Wat komt er aan bod: wat is een VPN ? verschillende mogelijkheden:
Windows XP als VPN Host Instellen van host Instellen van de client Linux als VPN Host (nog niet helemaal af) demo van mogelijkheden met beide hosts

3 VPN : Virtual Private Network :: deel I
Wat is een VPN? VPN : Virtual Private Network :: deel I beveiligde toegang tot thuis-/bedrijfsnetwerk via een publiek toegankelijk (open) netwerk packets bestemd voor eigen netwerk worden versleuteld en opnieuw ingekapseld in publieke packets andere gebruikers van internet hebben niets aan deze packets (men heeft de sleutel niet) PPTP: Short for Point-to-Point Tunneling Protocol, a new technology for creating Virtual Private Networks (VPNs) , developed jointly by Microsoft Corporation, U.S. Robotics, and several remote access vendor companies, known collectively as the PPTP Forum. Because the Internet is essentially an open network, the Point-to-Point Tunneling Protocol (PPTP) is used to ensure that messages transmitted from one VPN node to another are secure. With PPTP, users can dial in to their corporate network via the Internet. IPsec supports two encryption modes: Transport and Tunnel. Transport mode encrypts only the data portion (payload) of each packet, but leaves the header untouched. The more secure Tunnel mode encrypts both the header and the payload. On the receiving side, an IPSec-compliant device decrypts each packet. For IPsec to work, the sending and receiving devices must share a public key. This is accomplished through a protocol known as Internet Security Association and Key Management Protocol/Oakley (ISAKMP/Oakley), which allows the receiver to obtain a public key and authenticate the sender using digital certificates.

4 VPN : Virtual Private Network
Wat is een VPN? VPN : Virtual Private Network beveiligde toegang tot thuis-/bedrijfsnetwerk via een publiek toegankelijk (open) netwerk 2 protocollen specifiek voor VPN ontwikkeld PPtP IPsec PPTP: Short for Point-to-Point Tunneling Protocol, a new technology for creating Virtual Private Networks (VPNs) , developed jointly by Microsoft Corporation, U.S. Robotics, and several remote access vendor companies, known collectively as the PPTP Forum. Because the Internet is essentially an open network, the Point-to-Point Tunneling Protocol (PPTP) is used to ensure that messages transmitted from one VPN node to another are secure. With PPTP, users can dial in to their corporate network via the Internet. IPsec supports two encryption modes: Transport and Tunnel. Transport mode encrypts only the data portion (payload) of each packet, but leaves the header untouched. The more secure Tunnel mode encrypts both the header and the payload. On the receiving side, an IPSec-compliant device decrypts each packet. For IPsec to work, the sending and receiving devices must share a public key. This is accomplished through a protocol known as Internet Security Association and Key Management Protocol/Oakley (ISAKMP/Oakley), which allows the receiver to obtain a public key and authenticate the sender using digital certificates.

5 Protocollen VPN Protocol I : PPtP
PPtP: Point to Point Tunnelling Protocol ‘inbel’-verbinding met VPN Server tunnel via open netwerk (internet) beveiligd verkeer tussen VPN nodes PPTP: Short for Point-to-Point Tunneling Protocol, a new technology for creating Virtual Private Networks (VPNs) , developed jointly by Microsoft Corporation, U.S. Robotics, and several remote access vendor companies, known collectively as the PPTP Forum. Because the Internet is essentially an open network, the Point-to-Point Tunneling Protocol (PPTP) is used to ensure that messages transmitted from one VPN node to another are secure. With PPTP, users can dial in to their corporate network via the Internet. IPsec supports two encryption modes: Transport and Tunnel. Transport mode encrypts only the data portion (payload) of each packet, but leaves the header untouched. The more secure Tunnel mode encrypts both the header and the payload. On the receiving side, an IPSec-compliant device decrypts each packet. For IPsec to work, the sending and receiving devices must share a public key. This is accomplished through a protocol known as Internet Security Association and Key Management Protocol/Oakley (ISAKMP/Oakley), which allows the receiver to obtain a public key and authenticate the sender using digital certificates.

6 VPN Protocol II : IPsec : deel I
Protocollen VPN Protocol II : IPsec : deel I IPsec : IP secure verzendende en ontvangende partij moeten een public key* delen delen van de sleutel gaat via ISAKMP/Oakley ontvangende partij kan een public key ophalen ontvangende partij verifieert de verzendende partij aan de hand van digitale certificaten PPTP: Short for Point-to-Point Tunneling Protocol, a new technology for creating Virtual Private Networks (VPNs) , developed jointly by Microsoft Corporation, U.S. Robotics, and several remote access vendor companies, known collectively as the PPTP Forum. Because the Internet is essentially an open network, the Point-to-Point Tunneling Protocol (PPTP) is used to ensure that messages transmitted from one VPN node to another are secure. With PPTP, users can dial in to their corporate network via the Internet. IPsec supports two encryption modes: Transport and Tunnel. Transport mode encrypts only the data portion (payload) of each packet, but leaves the header untouched. The more secure Tunnel mode encrypts both the header and the payload. On the receiving side, an IPSec-compliant device decrypts each packet. For IPsec to work, the sending and receiving devices must share a public key. This is accomplished through a protocol known as Internet Security Association and Key Management Protocol/Oakley (ISAKMP/Oakley), which allows the receiver to obtain a public key and authenticate the sender using digital certificates.

7 VPN Protocol II : IPsec : deel II
Protocollen VPN Protocol II : IPsec : deel II ontvangende partij ontcijfert elk packet twee manieren om met IPsec te werken: Transport mode : payload (gegevens) worden versleuteld header wordt niet versleuteld Tunnel mode : zowel header als payload wordt versleuteld PPTP: Short for Point-to-Point Tunneling Protocol, a new technology for creating Virtual Private Networks (VPNs) , developed jointly by Microsoft Corporation, U.S. Robotics, and several remote access vendor companies, known collectively as the PPTP Forum. Because the Internet is essentially an open network, the Point-to-Point Tunneling Protocol (PPTP) is used to ensure that messages transmitted from one VPN node to another are secure. With PPTP, users can dial in to their corporate network via the Internet. IPsec supports two encryption modes: Transport and Tunnel. Transport mode encrypts only the data portion (payload) of each packet, but leaves the header untouched. The more secure Tunnel mode encrypts both the header and the payload. On the receiving side, an IPSec-compliant device decrypts each packet. For IPsec to work, the sending and receiving devices must share a public key. This is accomplished through a protocol known as Internet Security Association and Key Management Protocol/Oakley (ISAKMP/Oakley), which allows the receiver to obtain a public key and authenticate the sender using digital certificates.

8 Windows XP als Host :: deel I
VPN met Windows XP Windows XP als Host :: deel I Instellen als VPN host: nieuwe verbinding aanmaken gebruikers selecteren die toegang krijgen Externe toegang verlenen: Kiezen van de vorm van externe toegang: Extern bureaublad Toegang tot shares Alléén Windows XP Professional en Windows XP Media* (volgens MicroSoft *Extern Bureaublad ook mogelijk met Windows XP Home? Volgens Microsoft niet

9 VPN met Windows XP Configuratiescherm

10 Kies Netwerkverbindingen…
VPN met Windows XP Kies Netwerkverbindingen…

11 Netwerkverbinding(en)…
VPN met Windows XP Netwerkverbinding(en)…

12 Wizard nieuwe verbindingen
VPN met Windows XP Wizard nieuwe verbindingen

13 De verbinding instellen - I
VPN met Windows XP De verbinding instellen - I

14 De verbinding instellen - II
VPN met Windows XP De verbinding instellen - II

15 Binnenkomende verbindingen
Resultaat : Binnenkomende verbindingen

16 VPN met Windows XP :: deel II
Client instellen: Evt. inbelverbinding instellen VPN verbinding aanmaken Testen…

17 VPN Client instellen VPN Verbinding maken

18 VPN Client instellen VPN Verbinding maken

19 Wizard nieuwe verbindingen
VPN Client instellen Wizard nieuwe verbindingen

20 *In dit voorbeeld wordt ClarkConnect 3.2 Home Edition gebruikt
VPN met Linux – deel I * Instellen als VPN host Instellen van VPN op server Aanmaken gebruikers op server Windows XP clients instellen: Clients instellen Gebruikers selecteren *In dit voorbeeld wordt ClarkConnect 3.2 Home Edition gebruikt

21 VPN met Linux – deel II Client instellen Testen…
Evt. inbelverbinding aanmaken VPN verbinding aanmaken op client(s) Testen…

22 Waarom een VPN? Voordelen t.o.v. Remote Desktop:
Werken alsof je bent aangemeld op de server & netwerk Geen extra PC actief (kostenbesparing) Direct toegang tot gedeelde bronnen: mappen, bestanden en printers zonder tussenkomst van een extra pc voor RDP Nadelen: Dataverkeer via tunnel in open netwerk bij RDP alléén informatie over beeld, toetsaanslagen en muisbewegingen

23 Meer informatiebronnen
ClarkConnect Community Microsoft Expert Zone : Extern Bureaublad Planet Internet ‘cursus’: Toegang op afstand deel I Toegang op afstand deel II over netwerkprotocollen: TCP/IP IPX(32) SMB/NetBIOS/NetBEUI over netwerken (door novell)


Download ppt "hcc!pc Werkgroep netwerken"

Verwante presentaties


Ads door Google