?? vpnlecture.html
字號(hào):
<HTML><HEAD><TITLE>Virtual Private network [VPN] Lecture</TITLE>
<STYLE>@page {margin-left: 3.18cm; margin-right: 3.18cm; margin-top: 2.54cm; margin-bottom: 2.54cm; }
</STYLE>
</HEAD>
<BODY lang=en-US>
<hr color="#000000" width="50%" size="1"><center>
Virtual Private network [VPN] Lecture<br>
By _Jonah_<br>
For <br>
Blacksun Research Facility [BSRF]<br>
<a href="http://blacksun.box.sk">
http://blacksun.box.sk</a><br>
<hr color="#000000" width="65%" size="1"></center>
<P style="MARGIN-BOTTOM: 0cm"> </P>
<P style="MARGIN-BOTTOM: 0cm">**** BEGIN LOGGING AT Mon Jul 8 22:50:20 2002</P>
<P style="MARGIN-BOTTOM: 0cm">--> You are now talking on #bsrf</P>
<P style="MARGIN-BOTTOM: 0cm"><b>--- Topic for #bsrf is '.:: BlackSun Research
Facility (<a href="http://blacksun.box.sk"><br>
http://blacksun.box.sk</a>) ::. || Nothing illegal || Send in your BSRF
logos for the contest to Mikkkeee or AZTEK || email Simprix
(simprix@simprix.net) concerning lectures || lecture 07/08/02 at 11PM EST (4 am
GMT) on VPNS, by _Jonah_ || <a href="http://fusion.dyn.ee/bsrf2.gif">http://fusion.dyn.ee/bsrf2.gif</a></b></P>
<P style="MARGIN-BOTTOM: 0cm">--- Topic for #bsrf set by AZTEK at Sun Jul 7
10:08:49</P>
<P style="MARGIN-BOTTOM: 0cm">--- ChanServ gives channel operator status to
simprix</P>
<P style="MARGIN-BOTTOM: 0cm"><DigitalFallout> <---START
LECTURE---></P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> VPN =</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> Virtual Private network</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> the concept behind it is really
simple</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> although the implmentation is
not</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> e.g a company has branches that
are connected to a shared/public network</P>
<P style="MARGIN-BOTTOM: 0cm">--> _bAss
(ffffffffff@TCydwnX3BaI.a.004.syd.iprimus.net.au) has joined #bsrf</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> i.e. internet</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> and there some sorta data being
transacted</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> b/w two branches on that shared
network</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> the old days</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> way back early 90's :-p</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> if there was transactions being
done on the shared network</P>
<P style="MARGIN-BOTTOM: 0cm"><-- b0ttyburp
(b0ttyburp@7cZDwowQs8M.blueyonder.co.uk) has left #bsrf</P>
<P style="MARGIN-BOTTOM: 0cm">--> b0ttyburp
(b0ttyburp@7cZDwowQs8M.blueyonder.co.uk) has joined #bsrf</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> there was no security meassure
inplace on the physical data</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> soooo</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> happy hacker b0ttyburp was having
a field day</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> then some genious</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> well actualy</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> encryption been around for
ages</P>
<P style="MARGIN-BOTTOM: 0cm">--> scaal (eat@VP4FadmQevg.vic.bigpond.net.au)
has joined #bsrf</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> bleh</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> i forgot to mention</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> b/c that data was insecure</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> corporations leased lines</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> for telco co.</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> for point -to point</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> connections</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> that of course was extremely
costly</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> then VPN came a long</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> what VPN does</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> is on that shared network</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> it creates a virtual private
network ... hence VPN</P>
<P style="MARGIN-BOTTOM: 0cm"><-- [PhaLanX]
(phalanx@RPhz99t4THk.codetel.net.do) has left #bsrf</P>
<P style="MARGIN-BOTTOM: 0cm">--> [PhaLanX]
(phalanx@RPhz99t4THk.codetel.net.do) has joined #bsrf</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> by boaring a path between two
entities</P>
<P style="MARGIN-BOTTOM: 0cm"><-- Pike has quit ()</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> typically a Corp. Branch and a
smaller branch</P>
<P style="MARGIN-BOTTOM: 0cm"><-- Jason has quit (.:touchstone:.)</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> let me mention</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> what's really pushing this
technology is</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> globalization</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> and multinational corp, that need
to communicate</P>
<P style="MARGIN-BOTTOM: 0cm">--> c0ld
(c0ld@10LEG6SNXrg.chcgil2.dsl-verizon.net) has joined #bsrf</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> and would be physically impossible
to drop a piece of fiber from USA to KOREA</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> and the fact that telecomuters
need access to company resources that are secure</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> questions?</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> -m</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> well I'm sure you guys are smart
enough to understand this so far</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> well</P>
<P style="MARGIN-BOTTOM: 0cm"><linuxlogic> can VPN's be setup using any
OS?</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> q's?</P>
<P style="MARGIN-BOTTOM: 0cm"><hydeph> continue</P>
<P style="MARGIN-BOTTOM: 0cm"><_bAss> this must be a lecture right</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> it is not OS dependant</P>
<P style="MARGIN-BOTTOM: 0cm">linuxlogic LiquidCrystalDismay <hydeph> por
favor</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> but i will get into that</P>
<P style="MARGIN-BOTTOM: 0cm"><_bAss> =D</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> no more questions relative to
what i just said?</P>
<P style="MARGIN-BOTTOM: 0cm"><th0rn> hmm.... so are vpn's a whole other
type of topology?</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> VPNs are a logical and Physical
topology</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> i wil get into that</P>
<P style="MARGIN-BOTTOM: 0cm"><th0rn> k</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> i think everyone is on the ball so
far</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> there are 3 classes of VPNs</P>
<P style="MARGIN-BOTTOM: 0cm"><th0rn> ya, i was jus wondering how they are
layed out</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> A. Remote Dial in.....</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> those users will have a desire for
co. resources on an infrequent bases</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> or are constantly changing
physical locations</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> B. Always connected</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> connected</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> those are small branches, like a
cellular store </P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> or retail outless</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> or home telecommuters that need
permanent access</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> ... sorry for my spelling</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> and lastly</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> C. The Extranet class</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> this is a newly defined class of
the internet</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> essential</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> essentially</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> it is for large corp to
communicate with each other</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> and transfer critical data over
large geographic WANs</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> ok</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> there are a few fundamentals</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> that need to me taken heed of when
deploying a VPN</P>
<P style="MARGIN-BOTTOM: 0cm"><-- piksel has quit (Ping timeout: 180
seconds)</P>
<P style="MARGIN-BOTTOM: 0cm"><simprix> ready to continue</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> What type of security will you
employ, encryption type,, type of tunneling,, type of authen tication</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> B. What sorta QoS requirements
will ur deploy</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> QoS quality of service...</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> some QoS techniques would be
traffic shaping, packet prioritizing</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> packet queing</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> etc</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> and C. How will the VPN be
manage</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> btw i have my lecture notes on ftp
after this i'l put it up</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> AA. Security for VPN</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> (now i'm going to be referencing the
those three fundamentals)</P>
<P style="MARGIN-BOTTOM: 0cm">--> aphrael
(aphrael@NTCS7oS6MSA.dialup.mindspring.com) has joined #bsrf</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> the VPN is like i already said
connected across a shared network</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> i.e a tunnel</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> it is a Point-to-point
connection</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> between two nodes</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> the first process of </P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> initiating a VPN </P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> connecting</P>
<P style="MARGIN-BOTTOM: 0cm">--> guest284 (dick@k2UJmRwJyT2.64.5.220.O) has
joined #bsrf</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> is the process called Tunnel
Setup</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> this process involves
authentication</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> typically MD5...(message digest
5)</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> triple A authentication ....</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> AAA-
Authentication, authorization &accounting</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> thats based on radius and
tacacs</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> and you can use radius and
tacas</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> once the tunnel is
established</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> encryption begins</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> the last part</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> of security for the vpn</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> is to include some type of data
integrity checking</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> this is typically done by
protocols like</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> IPsec/SAP which i will describe
further in a bit</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> Beyond ensuring no other devices
interact (i.e. happy hacker b0ttyburp)</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> packet integrity should be
accounted for </P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> using new headers</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> attentuation, and packet
detriorzation should be tested</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> using ESP,AHA</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> SHA</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> AHA=algorithm hasing
authentication</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> dont hoold me to it but i think
that's it</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> and SHA secure hasing algorithm</P>
<P style="MARGIN-BOTTOM: 0cm"><_Jonah_> algorithm</P>
?? 快捷鍵說明
復(fù)制代碼
Ctrl + C
搜索代碼
Ctrl + F
全屏模式
F11
切換主題
Ctrl + Shift + D
顯示快捷鍵
?
增大字號(hào)
Ctrl + =
減小字號(hào)
Ctrl + -