Tunneling/VPN Security And
Implementation
Presented To: Dr. Fasee Ullah
Presenters:
Names:
Mohibullah Sail SU-15-01-002-123
Department: CS/IT
Program: BS-SE
University:
Sarhad University Of Science And IT Peshawar
Topics To Be Covered
 Introductions
 Applications
 Limitations
 Existing Challenges
 Available Solutions
 References
Introduction
What Is Tunneling[1]
 Tunneling is a protocol that allows for the secure movement
of data from one network to another
 Tunneling involves allowing private network communications
to be sent across a public network, such as the Internet
 In tunneling, the data are broken into smaller pieces called
packets as they move along the tunnel for transport
 As the packets move through the tunnel, they are encrypted
and another process called encapsulation occurs
Introduction
 What is VPN security[2]
 “Enable users on private networks to send and receive
data across public networks as if their computing
devices were directly connected to the private network”
 Usually increase privacy and security
 To prevent expose of private information
 VPNs typically allow only authenticated remote access
using tunneling protocols and encryption techniques
Introduction
 The VPN security provides[2]
 Confidentiality
 If the network traffic is sniffed at the packet level an
attacker would see only encrypted data
 Sender authentication
 To prevent unauthorized users from accessing the VPN
 Message integrity
 To detect any explanation of entrance with transmitted
messages.
Introduction
 Its Implementation[3]
 The remote user places a call to the local internet
service provider (ISP) point of presence (POP)
 The call is then encrypted and tunneled through the
internet, and connected to the destination server on your
building
 Some technologies even provide support for wandering
 which can allow a user to dial into an ISP anywhere to
gain access to an encrypted VPN
Applications
 Use Public or Hotel wi-fi securely[4]
 Public wi-fi offers no encryption security to its users
 Your signals are available to any one
 People use VPNs at Wi-Fi hotspots to prevent traffic from
attackers
 Secure Communication Between Sites[4]
 Many businesses today have branch offices
 To connect these branches to the main office
 They use a site-to-site VPN connection.
Limitations
 Problems with anonymity [5]
 The user cannot be 100% sure that he is anonymous
 Its VPN provider has the ability to view all browsing history
via its server
 So they are watching your data and traffic and can use it for
some other purposes
 Slow navigation [5]
 With a VPN service, the speed of the connection can be
reduced
 This slowness is due to the need for encryption for the
securing of data
 Also to the distance between the user and his VPN provider
Limitations(cont…)
 Limits for VPN used for mobile devices [5]
 VPNs do not provide data security for smart phone and
touch screen mobile devices
 You should be careful to choose only one VPN provider
that provides cross-platform support for mobile devices
 Insufficient Servers for Some VPN Providers[5]
 VPN servers are limited
 It becomes difficult to access online information
 Even if the user tries, the slow connection will cause
trouble
Existing challenges
 1. Subnet Conflicts [7]
 Networks connected via traditional VPN must not use the
same local subnet
 It will encounter one or more locations using the same
subnet addresses
 2. Routing [7]
 Connecting two remote networks with traditional VPN via a
central VPN
 Concentrator requires configuration and management of
advanced forwarding routing rules
 Traditional VPNs are suitable for one-to-one or many-to-
one connections, but not one-to-many
Existing challenges(Cont…)
 3. Firewall Opening[7]
 Traditional IPSec-based VPNs require special ports to
be open (unprotected)
 Therefore some firewall protocols allowed to
communicate through this configuration may be Hacked
by the attackers
 4. Firewall Blocking[7]
 VPN routes everything (and not just the protocols you
need)
 if you make the effort to create and manage a number of
firewall rules
Existing challenges(Cont…)
 5. Activity Logging [7]
 It is possible to restrict what traffic is allowed through the
VPN
 But that we do not require
 When you have so much traffic passing through a VPN, it
is impractical to log all activity
 6. Concentrator Management [7]
 Classic IPSec-based VPN solutions require an IT-
administered concentrator
 They require networking knowledge
 Also, individual concentrators must typically be installed at
each service provider
 To avoid very complex triangular routing and firewall
setups.
Available solutions
 Attachments and Hyperlinks[8]
 Never open email attachments and hyperlinks from
unexpected websites they may be fraud
 Pop-up Window[8]
 Never be used pop-up window by clicking a link may
be cause of steal of information
 Antivirus and Firewalls[8]
 Keep the latest definition of anti viruses and firewalls
Available solutions(cont…)
 User Education[8]
 Keep yourself updated about the latest trends in spam
attacks
 Filters[8]
 Use browser filters to block unlike websites looking for those
which might be another link looking for the next opportunity to
steal data
 Authentication[8]
 Utilize strong passwords--alphanumeric characters, capital
letters, and changing passwords at regular intervals. This
measure will help maintain proper authorization,
authentication and identity management of users logging into
the system. Thus, preventing threats from unauthorized users
accessing sensitive information on the web
References
1. https://www.techopedia.com/definition/5402/tunneling
2. http://www.enterprisenetworkingplanet.com/netsp/article.php/36245
66/Networking-101-Understanding-Tunneling.htm
3. https://en.wikipedia.org/wiki/Virtual_private_network#Security_mech
anisms
4. https://www.infosec.gov.hk/english/technical/files/vpn.pdf
5. https://www.quora.com/What-are-the-uses-of-a-VPN
6. https://medium.com/@mwhites9/complete-guide-to-the-advantages-
and-disadvantages-of-vpns-f58f354cb6e5
7. https://www.belden.com/blog/industrial-ethernet/secure-remote-
access-vs-vpns-a-guide-to-the-challenges-and-benefits
8. https://internetinitiative.ieee.org/images/files/resources/white_paper
s/protecting_internet_traffic_may_2017.pdf
Thankssss
Email: Mohibullah.Sail@gmail.com

Tunneling vpn security and implementation

  • 1.
    Tunneling/VPN Security And Implementation PresentedTo: Dr. Fasee Ullah Presenters: Names: Mohibullah Sail SU-15-01-002-123 Department: CS/IT Program: BS-SE University: Sarhad University Of Science And IT Peshawar
  • 2.
    Topics To BeCovered  Introductions  Applications  Limitations  Existing Challenges  Available Solutions  References
  • 3.
    Introduction What Is Tunneling[1] Tunneling is a protocol that allows for the secure movement of data from one network to another  Tunneling involves allowing private network communications to be sent across a public network, such as the Internet  In tunneling, the data are broken into smaller pieces called packets as they move along the tunnel for transport  As the packets move through the tunnel, they are encrypted and another process called encapsulation occurs
  • 4.
    Introduction  What isVPN security[2]  “Enable users on private networks to send and receive data across public networks as if their computing devices were directly connected to the private network”  Usually increase privacy and security  To prevent expose of private information  VPNs typically allow only authenticated remote access using tunneling protocols and encryption techniques
  • 5.
    Introduction  The VPNsecurity provides[2]  Confidentiality  If the network traffic is sniffed at the packet level an attacker would see only encrypted data  Sender authentication  To prevent unauthorized users from accessing the VPN  Message integrity  To detect any explanation of entrance with transmitted messages.
  • 6.
    Introduction  Its Implementation[3] The remote user places a call to the local internet service provider (ISP) point of presence (POP)  The call is then encrypted and tunneled through the internet, and connected to the destination server on your building  Some technologies even provide support for wandering  which can allow a user to dial into an ISP anywhere to gain access to an encrypted VPN
  • 7.
    Applications  Use Publicor Hotel wi-fi securely[4]  Public wi-fi offers no encryption security to its users  Your signals are available to any one  People use VPNs at Wi-Fi hotspots to prevent traffic from attackers  Secure Communication Between Sites[4]  Many businesses today have branch offices  To connect these branches to the main office  They use a site-to-site VPN connection.
  • 8.
    Limitations  Problems withanonymity [5]  The user cannot be 100% sure that he is anonymous  Its VPN provider has the ability to view all browsing history via its server  So they are watching your data and traffic and can use it for some other purposes  Slow navigation [5]  With a VPN service, the speed of the connection can be reduced  This slowness is due to the need for encryption for the securing of data  Also to the distance between the user and his VPN provider
  • 9.
    Limitations(cont…)  Limits forVPN used for mobile devices [5]  VPNs do not provide data security for smart phone and touch screen mobile devices  You should be careful to choose only one VPN provider that provides cross-platform support for mobile devices  Insufficient Servers for Some VPN Providers[5]  VPN servers are limited  It becomes difficult to access online information  Even if the user tries, the slow connection will cause trouble
  • 10.
    Existing challenges  1.Subnet Conflicts [7]  Networks connected via traditional VPN must not use the same local subnet  It will encounter one or more locations using the same subnet addresses  2. Routing [7]  Connecting two remote networks with traditional VPN via a central VPN  Concentrator requires configuration and management of advanced forwarding routing rules  Traditional VPNs are suitable for one-to-one or many-to- one connections, but not one-to-many
  • 11.
    Existing challenges(Cont…)  3.Firewall Opening[7]  Traditional IPSec-based VPNs require special ports to be open (unprotected)  Therefore some firewall protocols allowed to communicate through this configuration may be Hacked by the attackers  4. Firewall Blocking[7]  VPN routes everything (and not just the protocols you need)  if you make the effort to create and manage a number of firewall rules
  • 12.
    Existing challenges(Cont…)  5.Activity Logging [7]  It is possible to restrict what traffic is allowed through the VPN  But that we do not require  When you have so much traffic passing through a VPN, it is impractical to log all activity  6. Concentrator Management [7]  Classic IPSec-based VPN solutions require an IT- administered concentrator  They require networking knowledge  Also, individual concentrators must typically be installed at each service provider  To avoid very complex triangular routing and firewall setups.
  • 13.
    Available solutions  Attachmentsand Hyperlinks[8]  Never open email attachments and hyperlinks from unexpected websites they may be fraud  Pop-up Window[8]  Never be used pop-up window by clicking a link may be cause of steal of information  Antivirus and Firewalls[8]  Keep the latest definition of anti viruses and firewalls
  • 14.
    Available solutions(cont…)  UserEducation[8]  Keep yourself updated about the latest trends in spam attacks  Filters[8]  Use browser filters to block unlike websites looking for those which might be another link looking for the next opportunity to steal data  Authentication[8]  Utilize strong passwords--alphanumeric characters, capital letters, and changing passwords at regular intervals. This measure will help maintain proper authorization, authentication and identity management of users logging into the system. Thus, preventing threats from unauthorized users accessing sensitive information on the web
  • 15.
    References 1. https://www.techopedia.com/definition/5402/tunneling 2. http://www.enterprisenetworkingplanet.com/netsp/article.php/36245 66/Networking-101-Understanding-Tunneling.htm 3.https://en.wikipedia.org/wiki/Virtual_private_network#Security_mech anisms 4. https://www.infosec.gov.hk/english/technical/files/vpn.pdf 5. https://www.quora.com/What-are-the-uses-of-a-VPN 6. https://medium.com/@mwhites9/complete-guide-to-the-advantages- and-disadvantages-of-vpns-f58f354cb6e5 7. https://www.belden.com/blog/industrial-ethernet/secure-remote- access-vs-vpns-a-guide-to-the-challenges-and-benefits 8. https://internetinitiative.ieee.org/images/files/resources/white_paper s/protecting_internet_traffic_may_2017.pdf
  • 16.