136 77 9MB
English Pages 206 Year 1998
Turning the Internet Into Your Private Network
tfM
Kz •j >.
OJI) jjj
m
W/n>
m
'a.
•'/If >•
J'aH
*m
-
Private
Networks O'REILLY
Charlie
Scott,
Paul Wolfe
& Mike Erwin
Digitized by the Internet Archive in
2012
http://archive.org/details/virtualprivateneOOscot
Virtual Private
Networks
Virtual Private
Networks
Charlie Scott, Paul Wolfe, and
Mike Erwin
O'REILLY Cambridge
•
Koln
•
Paris
•
Sebastopol
•
Tokyo
Virtual Private
Networks
by Charlie
Scott,
Copyright
©
Paul Wolfe, and Mike Erwin
1998 O'Reilly
&
Associates, Inc. All rights reserved.
Printed in the United States of America.
Published by O'Reilly Editor:
&
Associates, Inc., 101 Morris Street, Sebastopol,
CA
95472.
Andy Oram
Production Editor: John
Files
Printing History:
March
Nutshell
Java™
1998:
First Edition.
Handbook and
Series
is
the Nutshell
Handbook logo
a trademark of O'Reilly
& Associates,
of puffins and the topic of virtual private networks
is
The between the image
are registered trademarks and
Inc.
The
association
a trademark of O'Reilly
&
Associates,
Inc.
Many
of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and O'Reilly & Associates, Inc. was aware of a trademark claim, the designations have been printed in caps or
initial
caps.
While every precaution has been taken
no
in the
preparation of this book, the publisher assumes
responsibility for errors or omissions, or for
damages
resulting
from the use of the
information contained herein.
@ This
book
O'Reilly
is
printed
on
& Associates
is
paper with 85% recycled content, 15% post-consumer waste. committed to using paper with the highest recycled content available
acid-free
consistent with high quality.
ISBN:
1-56592-319-7
Table of Contents
Preface 1.
2.
vii
Why Build a Virtual Private Network? What Does a VPN Do?
1
Security Risks of the Internet
4
Basic
VPN Technologies
Aspects of Your Organization
4.
5.
11 at
Risk
12
Deployment
19
Encryption and Authentication
29
Wide Area, Remote Access, and the VPN Common WAN Configurations and Their VPN Counterparts Remote Access and VPN Counterparts
42
The Hybrid System Cost Comparison Chart
58 58
A VPN Scenario
60
The Topology
60
Firewall
3.
2
42
49
Central Office
61
Large Branch Office
62
Small Branch Offices
63
Remote Access Users
63
A Network Diagram
64
Implementing the Point-to-Point Tunneling Protocol
66
How PPTP Works
67
Table of Contents
Advantages of PPTP Limitations of
6.
77
PPTP
78
and Testing PPTP Connections and Configuring PPTP on a Windows NT RAS Server
Configuring Installing
Configuring PPTP for Dial-up Networking on a Configuring PPTP for Dial-up Networking on a
Windows NT Client Windows 95 Client
Enabling PPTP on Remote Access Switches
Making the
7.
94
98
Calls
Implementing the AltaVista Tunnel
104
Advantages of the AltaVista Tunnel System
105
107
Tunnel Limitations
the AltaVista Tunnel
VPNs and
Works
107 112
AltaVista
Configuring
and
Testing the AltaVista Tunnel
Getting Busy
Tunnel
123
Configuring the AltaVista Tunnel Workgroup Server Configuring the
AT
Personal Edition for
Windows NT/95
Troubleshooting Problems
The Cisco PIX Firewall The PLX in Action Limitations of the
PLX Firewall
Managing and Maintaining Your VPN VPN
127 134 134
138 139
144 145
Operation of the PLX
Solving
123 123
Installing the AltaVista
10.
89 91
102
How
9.
82
Using PPTP with Other Security Measures
AltaVista
8.
81
154 155
Problems
Security Suggestions
159
Keeping Yourself Up-to-Date
162
A.
Emerging Internet Technologies
B.
Resources, Online
Index
and Otherwise
165
168 171
Preface
book
This
is
about a very
members
access between
new
area of computer technology: providing secure
of an organization
who
are cast far around the world.
Both the technology providers and the users are feeling
We
approached the idea of the
cism, being that fairly rity
common,
we own
as
virtual private
their
way.
network (VPN) with some skepti-
an Internet service provider. Security compromises are
end users
fail
to understand the importance of
and such. Though known cracks
are not
unfortunately, the successful cracks are those
password
common, attempted
integ-
cracks are;
you never hear about.
Customers began approaching us with requests
for solutions.
How
can
we
use the
global reach of the Internet to access our various networks around the country
and the world? Can we do it securely? Can we do it now? Charlie probably looked them square in the eye and said, "Oh, yeah, we can do that," then gave a cackle to Mike's and Paul's dismay. So, in the course of trying to find solutions for these needy customers, and for our own nationally expanding networks, we turned to the virtual private network, and eventually wrote this book. Although
it
and erecting
drama and tribulations of learning about book covers everything you need to know to get one up
doesn't fully represent the a
VPN,
this
and running. The technology of the however, specific solutions are
—
virtual private
fairly slim.
We
network
is
widely available;
cover the three that are currently
—
PPTP, the Cisco PIX firewall, and the AltaVista Tunnel and other on how VPNs work, how much they cost, and why you should use one. (And when you shouldn't.) available
basics
vii
Preface
viii
Audience We
a network administrator who has already set up local knows something about the Internet and remote access (dialVPN solutions are usually employed along with firewalls, which are dis-
assume
you are
that
area networks and in use).
cussed only briefly
you can
in this
book. For help with firewall concepts and technologies,
find a variety of useful books, including Building Internet Firewalls,
Chapman and
D. Brent
Elizabeth D. Zwickey, published
by O'Reilly
&
by
Associates,
Inc.
Contents of This Book 1, Why Build a Virtual Private Network? Do you need a virtual private network? Good question. Read this chapter and find out. After we scare you with some common security breaches, you will find some comforting reasons why a virtual private network may be your solu-
Chapter
tion.
Chapter 2, Basic Still
VPN Technologies
here? This chapter details the various pieces that
and make
more
it
secure.
Firewalls,
make
VPN
a
encryption/authentication,
function
and some
basic
VPN
some
of the varied and fun encryption technologies, such as Data Encryption
protocols and standards are covered. Rounding out this chapter are
Standard (DES), Kerberos, Pretty
Good
Privacy (PGP), and Secure Socket
Layer (SSL).
Chapter 3. Wide Area, Remote Access,
How much gies
is
is
this
and the VPN
going to cost me? Justifying the cost of
possible once you delve into the exciting world of
In this chapter, the
all
these technolo-
VPN bean
counting.
VPN's costs and benefits are weighed against the more
tra-
Wide Area Network (WAN) and remote compared through a comprehensive break-
ditional solutions: private lease-line
access.
The
three solutions are
down of equipment, may vary. Check your Chapter
4,
lines,
personnel and
local listings for a
—
—
most importantly showing near you.
time.
Prices
A VPN Scenario
Okay, you
VPN
say,
show me one
that actually
works. Well, here's a real
live
work-
company, though the names are changed to protect everyone involved. This chapter shows a VPN scenario in all its glory, detailing the needs of a company, and how the VPN saved the day. A description ing
from a
real live
of the network topology and various required items as a
handy network diagram.
is
also included, as well
ix
Preface
Chapter
Implementing the Point-to-Point Tunneling Protocol
5.
So what's
a
specific solution for
with the cheapest version
(tree!):
my VPN?
Well, there are several.
We
start
we
Point-to-Point Tunneling Protocol, or as
PPTP First, we offer a lengthy discussion of how PPTP works, then we detail PPTP solutions from various equipment and soft-
call
the "industry,"
in
it
ware manufacturers. Chapter 6, Configuring
Okay,
I've
and
resting
PPTP Connections
—but how? Here
decided to use your PPTP
is
everything you ever
know about getting PPTP running. We cover PPTP on Windows NT and Windows 95, as well as on Ascend remote access devices. Then we
wanted
to
teach you
Chapter
7.
PPTP
how
to test
and troubleshoot the connections.
Implementing the AltaVista Tunnel isn't
AltaVista
enough
Tunnel
a stable solution.
tages and
is
—do
me
for
VPN
else? Actually,
world;
it
and
and
yes.
The
has proven to be
we cover how the AltaVista Tunnel works, how may fit into your VPN scenario.
Here
limitations,
Chapters. Configuring
you have anything
the newest entrant into the
its
advan-
it
Testing the AltaVista
Tunnel
how do make work? We cover configuring server and client pieces on Windows NT and Windows 95, as well as mentioning a few Unix versions out there. We also cover testing and troubleshooting.
Okay,
Chapter
I
9.
it
The Cisco PIX Firewall
What's the top of the features arid
line?
bandwidth
For now, we've found Cisco PIX to offer the most
—an expensive choice, but perhaps the only one
large sites will find satisfactory. In this chapter
we
that
cover what PIX can do, as
well as configuration of the firewall and the private network.
Chapter
10,
Now
Managing and Maintaining Your VPN Someone can't dial in, or
what's wrong?
yesterday
is
network (or
a connection that worked fine down. This chapter takes you through the various points on the your Internet provider's network) where access has failed. It also
offers suggestions for policies that increase security
on the VPN.
Appendix A, Emerging Internet Technologies This appendix covers Ipv6 (the newest version of the Secure Wide Area Network (S/WAN).
Appendix B, Resources, Online and Otherwise Technology and products for VPNs are evolving places we've found useful for the latest information.
IP protocol), IPsec,
quickly.
Here's a
and
list
of
x
Preface
Conventions Used in This Book The following conventions
are used in this book:
Italic is
used for filenames, directory names, and URLs.
Constant width is
used
code examples.
for
Constant width bold In some code examples,
highlights the statements being discussed.
Constant width italic Indicates an element (e.g., a filename or variable) that
you supply.
Comments and Questions Please address O'Reilly
&
comments and questions concerning
this
book
to the publisher:
Associates
101 Morris Street
CA
Sebastopol,
95472
1-800-998-9938 (in the U.S. or Canada) 1-707-829-0515 (international or local)
1-707-829-0104 (FAX)
You can
also
send us messages
request a catalog, send email
electronically.
To be put on our
mailing
list
or to
to:
[email protected] (via the Internet)
To ask
technical questions or
comment on
the book, send email
to:
[email protected] (via the Internet)
Acknowledgments The authors collectively wish to thank our insightful and understanding editor, Andy Oram. Without his direction, gentle reminders, and gracious deadline extensions, this book wouldn't be here. Charlie
would
like to dedicate his portion of this
book
to his wife Mary,
weathered the past two years of authoring exceptionally He'd also
like to
well.
"You are
thank Mike and Paul.
Paul thanks his family (Brenda, Nikolaus, Lukas, and Rayna) for putting his long nights
who has my life."
away from home. Thanks
to
up with
Outernet for their bulletproof net-
xt
Preface
work, without which
this
book would not be
possible.
And thanks
to Jennifer
Alexander for reviewing and offering comments.
Mike would like to extend a hearty "thanks for everything you've done" to Kris Thompson, for lending him a Cisco PIX unit as well as his expert assistance in helping to get
it
configured and working. He'd also like to extend a most grateful
thank you to Jennifer Alexander, flow of his work family,
who
in
its
who
read, reviewed,
and commented on the
primordial form. He'd like to further thank his friends and
put up with him as he tried to
fit
writing into his crazy schedule.
The authors would like to thank Jennifer Alexander, Gregg Lebovitz, Gordon C. Galligher, and Matt Eackle for their technical reviews, which mixed useful fixes and insightful general suggestions. The authors also wish to thank William Hurley for acting as their agent on this book. The authors would also like to thank the production staff at O'Reilly & Associates. Files was the production editor and copyeditor. Claire Cloutier LeBlanc was the proofreader. Mary Anne Mayo and Sheryl Avruch performed quality control checks. Seth Maislin wrote the index. Edie Freedman designed the book's cover. Mike Sierra implemented the format in FrameMaker. Robert Romano created the illustrations. Elissa Haney and William W. Plummer, Jr., provided production sup-
John
port.
In this chapter: • •
What Does a VPN Do?
1
Security Risks of the Internet
Why Build a
Virtual
Private Network?
now there has always been a clear division between public and private networks. A public network, like the public telephone system and the Internet, is a large collection of unrelated peers who exchange information more or less freely Until
with each other. The people with access to the public network
have anything
in
common, and any given person on
municate with a small fraction of
A
private
network
is
composed
its
that
may
or
may
not
network may only com-
potential users.
of computers
owned by
a single organization that
share information specifically with each other. They're assured that they are going
be the only ones using the network, and that information sent between them will (at worst) only be seen by others in the group. The typical corporate Local to
Area Network (LAN) or Wide Area Network (WAN)
between a the gateway router, where the public network out of
work. The
line
is an example of a private netand public network has always been drawn at company will erect a firewall to keep intruders from
private a
their private
network, or keep their
own
internal users
from perusing the public network. There also was a time, not too long ago, when companies could allow to operate as separate, isolated islands.
LAN, with
its
own naming
—
Each branch
office
scheme, email system, and even
their
might have its
own
its
LANs
own
favorite net-
work protocol none of which might be compatible with other offices' setups. As more company resources moved to computers, however, there came a need for these offices to interconnect. This was traditionally done using leased phone lines of varying speeds. By using leased lines, a company can be assured that the connection is always available, as well as private. Leased phone lines, however, can be expensive. They're typically billed based upon a flat monthly fee, plus mileage expenses. If a company has offices across the country, this cost can be prohibitive.
Chapter
Wljy Build a Virtual Private Network?
1:
Private networks also have trouble handling roving users, such as traveling sales-
people.
If
the salesperson doesn't
he or she has to
ers,
happen
to
be near one of the corporate comput-
modem
dial into a corporation's
long-distance,
which
is
an
extremely expensive proposition.
book is about the virtual private network (VPN), a concept that blurs the line between a public and private network. VPNs allow you to create a secure, private network over a public network such as the Internet. They can be created using software, hardware, or a combination of the two that creates a secure link
This
between peers over
is done through encryption, packet go over exactly what is meant by each of these, VPN, later in this chapter, and touch upon them
network. This
a public
tunneling,
and
and what
roles they play in a
firewalls. We'll
again and again throughout the book. Because they using the Internet as a
WAN, VPNs
more
are
skirt
leased line costs by
cost-effective for large companies,
and well within the reach of smaller ones. In this chapter, we'll also talk about Intranets as the latest trend in corporate infor-
mation systems, and
how
they were the impetus for VPNs.
What Does a VPN Do? A
virtual private
network
work, such as the virtual
is
Internet.
connections
—
that
way
a It
is,
is
to simulate a private
called
"virtual''
network over
because
temporary connections
it
that
presence, but consist of packets routed over various machines
an ad hoc
a
on
the Internet
on
Secure virtual connections are created between two machines, a
basis.
machine and
a public net-
depends on the use of have no real physical
network, or two networks.
Using the Internet for remote access saves a
wherever your Internet service provider
of money. You'll be able to dial in
lot
(ISP) has a point-of-presence (POP).
If
you choose an ISP with nationwide POPs, there's a good chance your LAN will be a local phone call away. Some ISPs have expanded internationally as well, or have alliances with ISPs overseas. Even many of the smaller ISPs have toll-free numbers for their roaming users. At the time of this writing, unlimited access dial-
up PPP accounts,
suitable for business use, are
even speculate what
they'll
be next
should be cheaper than setting up a the long-distance cally
hours In
bill
for
roaming
cheaper than having your in
many
year! At
modem Even
users.
own
around $25 per month.
any
rate,
We
won't
well-chosen ISP accounts
pool for remote users, and paying toll-free
toll-free
access from an ISP
is
typi-
number, because they purchase
bulk from the long-distance companies. cases, long-haul connections of
connection to
a
networks are done with a leased
line,
a
frame relay network, or ISDN. We've already mentioned the costs
of leasing a "high cap" leased line such as a Tl. Frame relay lines can also give
What Does a VPN Do?
you high speeds without the mileage charges. You purchase a connection to a frame cloud, which connects you through switches to your destination. Unlike a leased line, the amount you pay is based more on the bandwidth that's committed to your circuit than distance.
however. ISDN,
Frame connections
like the plain old
are
still
somewhat expensive,
telephone system, incurs long-distance charges.
company charges per minute even for situations where corporate office networks are in separate cities, having each office get a Tl, frame relay, or ISDN line to an ISP's local POP would be much cheaper than connecting the two
In
many
locations, the local telephone
local calls,
which again runs expenses up. For
offices using these technologies. ers at the
two
offices,
A VPN
could then be instituted between the rout-
over the Internet.
The Rise of Intranets By now you've probably heard of Intranets and the stir they've caused at many businesses. Companies are running TCP/IP networks, posting information to their internal web sites, and using web browsers as a common collaborative tool. An example of an Intranet application is a customer database accessible via the Web. Salespeople could use uct offerings
this
database to contact current customers about
and send them quotes. The database could have
up Language (HTML)
front-end, so that
it's
accessible from any
a
new
prod-
HyperText Mark-
web
browser.
was spurred on by the growth of the Internet and its popular commonly known as the World Wide Web. It was as if the corporate sector had finally caught on to what the Internet community had been doing for years: using simple, platform-independent protocols to communicate more effectively. No matter how much marketing hype you hear, an Intranet is simply Internet technology put to use on a private network.
The
rise
of Intranets
information services,
How VPNs relate to Intranets Virtual private
networks can be used to expand the reach of an
Intranets are typically used to
want them accessible from the want
Intranet. Since
communicate proprietary information, you don't Internet.
There may be cases, however, where
far-flung offices to share data or
remote users to connect to your Intraand these users may be using the Internet as their means of connection. A VPN will allow them to connect to the Intranet securely, so there are no fears of you'll net,
sensitive information leaving the I
sing our previous
network unprotected.
example of the customer database,
it's
easy to see
how
a
VPN
could expand the Intranet application's functionality. Suppose most of your salespeople are on the road, or work from home. There's no reason that they shouldn't be able to use the Internet to access the
tomer database application. You don't want
just
web
server that houses the cus-
anyone
to
be able
to access the
Chapter
information, however,
and you're
1:
Why Build a
Virtual Private
also worried about the information itself flow-
ing unencrypted over the Internet.
A VPN can provide a secure link between the web server running the database, and
laptop and the Intranet
salesperson's
VPNs
encrypt the data going between them.
you
give
flexibility,
and allow
any corporate network service to be used securely across the
cally
Network?
practi-
Internet.
Security Risks of the Internet The
risks associated
with the Internet are advertised every day by the trade and
mainstream media. Whether
it's
someone accessing your
ing into your legal troubles, or erasing your
files,
credit card
there's a
new
numbers, pry-
scare every
month
about the (supposedly) private information someone can find out about you on
you might happen upon you might not want your chil-
the Internet. (Not to mention the perceived risk that
some information
that
you
find offensive, or that
dren to see.) For corporations, the risks are even more
and apparent. Stolen or deleted
real
porate data can adversely affect people's livelihoods, and cost the
money.
If
a small
company
is
robbed of
its
cor-
company
project files or customer database,
it
could put them out of business. Since the Internet
is
a public network,
access any system you connect to
have to have
to find a
access,
work
dial into
is
and
it.
you always used to be
It
risk
having someone possibly
that a
system intruder would
your network to crack a system. This meant
phone number connected
risk the possibility of the line
to a
modem bank
that they would would give them
if
your corporate net-
is lax,
the system cracker
being traced. But
connected over the Internet and your security
that
might be able to access your network using any standard dial-up account from
any ISP
in the world.
Even unsophisticated users can obtain and use automated company's network. What's worse is
"security check" tools to seek out holes in a that
chances
are, you'll
never
know
that
it's
happening.
What Are We Protecting with Our VPN? first things that come to mind when you think of protection are the on your networked computers: Microsoft Word files that contain your com-
Probably the files
pany's future plans, spreadsheets that detail the financial analysis of a uct introduction, databases of
new
prod-
your payroll and tax records, or even a security
assessment of your network pointing out holes and problematic machinery. These are a good starting point, but don't forget about the other, less tangible assets you connect to the Internet when you go online. These include the services that you grant your employees and customers, the computing resources that are available for use, and even your reputation. For instance, you would consider it a files
that
Security Risks of the Internet
security failure
other sites or
The
your users complained
if
would be
easiest thing
Well over half the data you rity.
Just think,
worse than
Your goal
a negative to identify
is
to isolate, tabulate,
manage and
Human
and lock down your
private data.
some
sort of secu-
distribute
could
in a negative advertising
campaign aimed
and categorize
around, and out of the company. To
common
to
call for
even something as innocuous as customer records and addresses
could be used against you far
make connections
that they couldn't
your vendors' email bounced back to them one day.
if all
categories into
which
to
at a
all
might hurt you
this
slice of the
population.
of the private data that flows into,
you,
assist
campaign;
random
we have developed
group the private
a small
list
of
data:
resources
Employee
private data, tax information,
bonus and award information
Security information
User passwords, user accounts, access
levels, firewall structure,
network maps
and diagrams Business organization Organization charts and planning
Databases
Customer records, account records, accounting, finance, administration, and support
Product development
White papers,
CAD
drawings, source code,
test
results,
and research and
development information Unfortunately, in the client-server world of telecommuters, field sales agents,
home
offices,
tected area.
it's
The
not so easy to keep
all
private data locked
chief financial officer of a
down
company may need
information on the road, or a programmer working from access source code. files
VPNs help
alleviate
some
and
in a single, pro-
to access financial
home may need
to
of the worry of transmitting secure
outside of your network.
Possible Threats to Your
Data
We've come up with some basic security problems to watch out for when mixing the Internet and your LAN ways that users might be able to get at your data. Some are more likely than others, and there are many more we could add to this
—
list.
Chapter
2,
details (as will
Basic
VPN
Technologies, goes into a
any good book on network
security).
few other
threats
and more
Chapter
1:
Why Build a
Virtual Private
Network?
Network intrusion Network
intrusion
every network administrator's nightmare. With an intrusion
is
someone from the outside is able to access machines on your network as if they are the owner or administrator of that machine. They do this by guessing a password guessing someone's password through trickery or a knowledge of per-
attack,
—
sonal interests (social engineering), or exploiting security holes in an operating
Once
system.
on, they can
you from getting
into
from your systems. intrusion least
is
your
When
download or
own
your network
a very real possibility;
commonly attempted)
it
is
keep on another network
delete important data, read email,
system, or launch an attack is
connected to the
Internet,
probably one of the most
security attacks
on the
network
common
(or at
Internet.
IP address spoofing IP address spoofing. involves
someone on
the Internet pretending to have an IP
address on the inside of your network. This
packet
filtration firewall,
address.
Once
which can block
is
traffic
done
typically
based on
to get
around a
a source or destination
past your firewall, the intruder can attempt to break into your sys-
is also used to launch denial of service attacks, which either comoverwhelm a machine or cause it to start something it can't finish. An example of the latter is the TCP SYN flood attack (the notorious "killer ping"), which came to public attention when it brought down a major ISP.
tems. Spoofing pletely
Packet sniffing In the world of electronic security risk
on the
commerce, packet
connected to a network to watch network dissect individual packets to locate
sniffing
Internet. Packet sniffing occurs
and see the data
traffic
as
by
is
when
streams by. The sniffer can
it
inside. Sniffing tools are typically
problems with network devices or protocol
stacks, but they
used by evildoers to capture passwords or other sensitive ers.
PGP
emailers, Kerberos services,
and other
The
being
data. Secure
web
serv-
is
much
very
a mat-
in the right place at the right time.
ultimate vantage point for a packet sniffer
your network, so that they
used
can also be
have been designed to com-
tools
bat this threat. Truthfully, however, successful packet sniffing ter of
most feared
far the
person uses a machine
a
need
to
that they're only seeing
would be
your local
have access to your Ethernet, so
traffic.
it's
an employee. Or, someone could social-engineer their ing as a technician. ("I'm
Bob with IBM, and
directly
Of
most
way
I'm here to
likely to
into
fix
connected to
course, this
means
be done by
your building pos-
the network." Every-
one knows the network always needs fixing!) A network intruder could also crack into a system on your network and compile a utility that will allow them to view
TCP
IP traffic.
Security Risks of the Internet
is much more complex. Because many ISPs are multihomed (they have more than one connection to the backbone providers), data can take a number of paths, making it hard for a cracker to know where to put the sniffer. The best place for someone to sniff your traffic would be at one of
Packet sniffing on the Internet
the ISPs to
which you're connecting. The second best place would be at one of where the backbone providers connect
the major network access points (NAPs)
with each other.
How VPNs Solve Internet Security Issues A VPN hand.
is
a conglomerate of useful technologies that originally
Now
were assembled by VPN and are
the networking companies have realized the value of a
offering products that
do
the hard
work
for you.
Firewalls
An
Internet firewall serves the
same purpose
protect a certain area from the spread of
fire
as firewalls in buildings
and
and
cars: to
a potentially catastrophic explo-
The spread of a fire from one part of a building is controlled by putting up which help to contain the damage and minimize the overall loss and exposure. An Internet firewall is no different. It uses such techniques as examining Internet addresses on packets or ports requested on incoming connections
sion.
retaining walls,
to decide
what
Although most
traffic is
VPN
packages themselves don't implement firewalls
are an integral part of a itors
allowed into a network.
VPN. The idea
is
to use the firewall to
from entering your network, while allowing
The most common
firewall
fied IP services (run
Many
on
is
VPN
they vis-
users through.
a packet filtration firewall,
specific port
routers that support
VPN
directly,
keep unwanted
which
will
block speci-
numbers) from crossing the gateway
router.
technologies, such as the Cisco Private Internet
Exchange (PIX) and the 3Com/U.S. Robotics Total Control, also support packet
fil-
tration.
Packet
can also be used to help prevent IP address spoofing. by allowing only packets that bear a source address from one of
filtration firewalls
You can do
this
your networks to leave the gateway.
Similarly,
you can allow only packets with
a
source address from outside of your network to enter the gateway.
Authentication Authentication techniques are essential to VPNs. Most authentication systems are
based upon a shared key system. The keys are run through a hashing algorithm
which generates
own
a
hash value. The other party holding the keys
hash value and compare
it
to the
one
it
will generate
received from the other end.
its
The
8
Chapter
hash value sent across the Internet
that uses this
Authentication
a
is
performed
at the
beginning of a session, and then
be used to ensure data
integrity.
The
can be sent through a hashing algorithm to derive a value that
itself
at
the course of a session to ensure that an impostor didn't "slip in"
to the conversation. Authentication can also
data
password. The Challenge Handgood example of an authentication
scheme.
typically
is
random during
Virtual Private Network?
to glean a
shake Authentication Protocol (CHAP)
method
Why Build a
meaningless to an observer, so someone
is
network wouldn't be able
sniffing the
1:
included as a checksum on the message.
from one peer to the next means the data
is
Any deviation in the checksum sent was corrupted during transmission, or
intercepted and modified along the way.
Encryption All
VPNs support some type
of encryption technology, which essentially packages
data into a secure envelope. Encryption tication, for
it
often considered as essential as authen-
is
protects the transported data from packet sniffing. There are
two
popular encryption techniques employed in VPNs: secret (or private) key encryption
and public key encryption.
In secret to
all
key encryption there
parties that
is
need access
password or passphrase known
a shared secret
key
to the encrypted information. This single
is
used to both encrypt and decrypt the information. The tried-and-true data encryption standard (DES), is
an example of
One problem
which the Unix crypt system key encryption method.
call
uses to encrypt passwords,
a private
with using secret key encryption for shared data
needing access to the encrypted data must
know
is
that
parties
all
the secret key. While this
is
fine
workgroup of people, it can become unmanageable for a large network. What if one of the people leaves the company? Then you're going to have to revoke the old shared key, institute a new one, and somehow securely notify
for a small
all
the users that
it
has changed.
Public key encryption, a lic
newer and
increasingly
common
key and a private key. You publish your public key
you know your encrypt
it
receive
it,
private key.
If
you want
to
system, involves a pubto everyone, while only
send someone sensitive
with a combination of your private key and their public key. they'll
decrypt
it
data,
you
When
they
using your public key and their private key. Depend-
—
private keys can be large too large for anyone to remember. Therefore, they're often stored on the machine of the person using the
ing
on the
software, public
and
encryption scheme. Because of
this,
private keys are typically stored using a
key encryption, such as DES, and a password or passphrase you can remember, so that just because someone gets on your system, they won't be able
secret
to see
what your private key looks
like.
Pretty
Good
Privacy (PGP)
is
a well-
Security Risks of the Internet
known
data security program that uses public key encryption;
key system
lic
that
is
popular
particularly
in
The main disadvantage of public key encryption data, the encryption process
Because of
this,
data
RSA
that, for
is
transfers
need
that
another pub-
an equal amount of
typically slower than with secret
is
is
commercial products.
a
key encryption.
good amount of speed, such
as
encrypted streams over a network, are encrypted using secret key encryption with a
key
that's
good only
for that streaming session.
cally smaller than the data)
over the
go
We'll
is
The session
secret itself (typi-
encrypted using public key encryption and
is
sent
link.
into detail about the power, politics,
niques in Chapter
and use of various encryption tech-
2.
Tunneling
Most of the current
VPN
packages use tunneling to create a private network,
including the three we'll review in this book: the AltaVista Tunnel, the Point-to-
VPNs
Point Tunneling Protocol (PPTP), and the Layer 2 Forwarding Protocol.
allow you to connect to a remote network over the Internet, which
work. The
fact
is,
is
an IP net-
though, that most corporate LANs don't exclusively use
NT
works with Windows
servers, for instance, will use
IP.
Net-
NetBEUI, while Novell
you to encapsulate a packet within a packet to accommodate incompatible protocols. The packet within the packet could either be of the same protocol or of a completely foreign one. For example, tunneling
servers use IPX. Tunneling allows
can be used to send IPX packets over the Internet so that a user can connect to a Novell server remotely. IPsec
The next
step for
VPNs
is
secure
IP,
or IPsec. IPsec
is
from
a series of proposals
the IETF (RFCs 1825 through 1829) outlining a secure IP protocol. These extensions that
would provide encryption
SSL and most
Why ages?
some
VPN
at
the IP level, rather than at the higher levels
packages provide.
create a secure version of IP rather than just stick with the current
The
principle reason
of the primary
VPN
is
that
it
creates an
for
status,
it's still
to.
Although IPsec has yet to make
it
into
it
to
Appendix
Emerging Internet Technologies.
Running of
pack-
an integral part of future generations of the
IP protocol. For that reason, we're going to limit our coverage of A,
VPN
VPNs. Currently,
contenders use proprietary encryption, or open stan-
dards that only a few vendors adhere
widespread commercial
open standard
a virtual private
reliability.
network over the Internet
raises
an
easily forgotten issue
10
Chapter
Let's face
a packet
the Internet
it:
1:
Why Build a
networks of varying speeds,
may
pass through a half-dozen different
—each
and
reliability,
utilization
company. Any one of these networks could cause
to
potential
run by a different
problems
for a
VPN.
Blame
The lack of reliability of the Internet, and the fact makes troubleshooting VPN problems difficult for user can't dial into a remote access server a
Network?
always the most reliable network by nature. Tracing
isn't
from one point to another, you
Finding Out Who's
Virtual Private
at
that
a
no one
entity controls
network administrator.
If
it,
a
the corporate headquarters, or there's
a leased line connection, the network administrator knows there number of possibilities for where the problem may occur: the router on the far end, the telecommunications company providing the
problem with
are
a
limited
machine or link,
or the machine or router at the corporate headquarters. For a
VPN
over the
problem could be with the machine on the far end, with the ISP on the far end, with one of the networks in between, with the corporate headquarters ISP, or with the machine or router at the corporate headquarters itself. Internet, the
Although a few large ISPs are offering quality of service guarantees with
VPN
service
can't
make such
parties involved are
a guarantee
connected to
is
left
to her
—and there
own
will
always be times
resources. This
their
their network), smaller ISPs
when
book will help you problem when something goes wrong on your VPN.
administrator identify the
(if all
the network isolate
and
In this chapter: •
Aspects of Your Organization at Risk
•
Firewall Deployment
•
2
Encryption and Authentication
Basic VPN Technologies A box Yet
without hinges, key, or
golden treasure inside
—
J.
is
lid,
hid.
R. R. Tolkien,
The Hobbit
This chapter focuses on the background technologies that are used to support the building of a virtual private network. As
we
discussed in Chapter
1,
Why
Build a
two competing camps at work when we talk networks together. The first camp places the highest worth about interconnecting data anywhere the user might be, and anywhere the data accessibility of on the might be. The second focuses on the fact that the data itself, the content, is most important and must be protected to prevent unauthorized persons from using it. As you can see, these two concepts are not at all mutually exclusive, but more of a yin-yang tai chi. As you focus on wanting to share more and more information so that everyone can get what they need, you must also remain focused on the Virtual Private Network?, there are
security of that publicity so that others will not take advantage of you.
Because the Internet
is
a vast collection of resources,
it
is
clear that sharing
your
information with the other participants will help you succeed and be prosperous. It
is
nect.
not clear, however, It is
at
what
risk
you place yourself when you
actually con-
our opinion that some companies see the Net as a huge untapped marof consumers
and advertising opportunities, but don't see that the It is this, above all else, that compels us to protect our data, and where the emergence of the virtual private network presents itself as a stepping stone into the 21st century. The protection of private data is the core of the virtual private network, and the two most relevant technologies (encryption and firewalls) are what make it all possible. ketplace,
full
Internet has
its
own
version of an "underworld" as well.
11
Chapter
/2
In this chapter
we
you must use
to build a
look will
at
your
site
at its
gateway
Basic
VPN Technologies
an overview and background of the
will present
strategies that
VPN.
We
will start
and how they
will
perform attacks upon your systems. Then
how
delve into
2:
how
firewalling techniques are used to protect an entire
routers.
on encryption, how using a VPN.
with a discussion of
it
And is
we
last,
used
will present
intruders
we
network
you with a general background and how it will be deployed
in a traditional sense,
Aspects of Your Organization at Risk What do you have
worry about when you attach remote users and networks
to
your organizational center? That's what
we enumerate
to
in this section.
Your Computing Resources A very valuable resource simple data puters.
The
files, is
hacker can pirate from you, even beyond that of
power of your Internet-connected commore aware and more worried about
security conscious are typically
the theft of data
unknown
that a
the actual processing
files
than the use of computing equipment by outside people for
reasons.
Generally,
it
is
less
common
an intruder to use your computing equipment
for
is much harder to track and much making use of your computers for their ends are likely to have entrenched themselves very deep, and have probably installed numerous backdoors into your equipment for re-entry. In the event that you are certain that an intruder is using some of your equipment, either by noting strange processes running at strange hours, or by witnessing first-hand connections from strange locations, you must take immediate action. Simply knocking
than to
just steal files,
but the former problem
harder to eradicate. Intruders
who
are
the intruders off or terminating their process will not address the root of the prob-
You
lem. will
will
need
scrutinize
from the Net and freeze
to disconnect the system
then need to wipe the drive,
re-install the
its files.
You
operating system from scratch, and
of your data and local application-ware before re-installing it on the you should regenerate new passwords for all users who had access to
all
unit. Last,
the system.
The
virtual private
router of
need
to
some
network, which typically
type, can prevent
many
is
erected through a gateway host/
of these types of breakins, but you
keep a close watch over the equipment
web
FTP
that
you allow customers
still
to
and mail servers are always prime targets for compromise. Keep these systems as secure as you can, using a firewall to prevent access to specific services, and as always, keep good backups. Since access. Things like
servers,
customer access equipment usually
is
servers,
filled
with data that
is
of only slight conse-
Aspects of Your Organization at Risk
quence
if
A3
gets stolen or trashed, the best policy for recovery
it
is
mirror around for quick restoration. Backup tapes could serve the
just to keep a same purpose,
but they will leave several hours of lead time during which the system will be
down.
Your Good Name Probably something you rely on every day, something that has a great impact
upon your business and customers, against your equipment,
make new petitors
you
is
your reputation. By having ongoing attacks
lose face in the eyes of
customers hesitant or unwilling to
something with which
to
denounce you
Having repeated breakins, information
leaks,
your customers and vendors,
approach you, and give your compublicly.
and data
loss gives others the idea
you are unstable and untrustworthy with their private data as well own, and may compel them to look elsewhere for products and services.
that
your
as
Your Services Services that
you
will likely offer to the Internet include mail
SMTP, and IMAP protocols),
Web
or World
cols), and a host of other things including
(such as the POP,
Wide Web (HTTP and HTTPS
proto-
DNS, FTP, video or audio streaming,
and network time. Our discussion of services plays directly into the next where we begin to explore one of the introductory yet powerful ways for
section,
protect-
ing data (firewalls).
Although they are not tangible
like actual data files that contain
customer
credit
on the Internet play a huge role in defining the form the firewall takes, and what types of data you think will assist the customer. Before even embarking on the creation of the firewall, you need to develop an overall data strategy. What do customers have access to? What do normal employees have access to? What can advanced security folks see and do? Once you have spent some time in detailing the blueprint for your network, then you can begin to architect the doors and windows
card numbers or the
that
services that
you choose
to offer your customers
permit shoppers.
In simple terms, will
like,
you should
be providing them. Since
identify the public services this will
be the most
and the machines
that
logical starting point for
an
The fewer the holes that you will need to punch in the firewall, the better. According to some security experts, it is best to separate each individual service on a separate machine, to minimize the threat of an attack taking down more than one service at a time. Hence, don't run out and grab a Sun, and pile everything on it, like sendmail,
assailant's attacks, this
is
the best place to limit their choices.
14
Chapter
web
FTP, a
server,
an Oracle database, an IRC chat
2:
server,
VPN Technologies
Basic
and
a video redirector.
Separate services logically, and the firewall will take shape on
its
own
based on
your decisions.
Some popular services are sometimes very dangerous to run. and traditionally come with security dilemmas that we can never seem to shake. The protocol and service that
most bad-mouthed by security professionals
is
The reasons
for this are simple: the source
code
sendmail (the Berkeley Version 8 software)
tion of
the sendmail server.
is
most popular implementa-
for the
and
readily available
is
it's
almost guaranteed that at least one machine on everyone's network will be runit and becomes
ning
will allow port 25
it
a
good place
(SMTP)
traffic to
to apply a lever for
they always have a starting point somewhere.
suming, too to
make
difficult to
worth
it
and
Our goal
difficult to locate,
efforts.
We
Since this
in.
hate to say
is
so
common, words,
attackers. In other
to
is
make
and once
it,
but
if
it
in,
too time con-
too
you look
little
data
like a ter-
then they will go elsewhere and leave you alone. Most computer
rible target,
much
crimes are
complete, too
their time
come
would-be
like
everyday
"real" crimes. Shoplifting is a
good comparison,
because both are crimes of convenience and both could be avoided by erecting a minimal deterrent.
How
Will the Intruders Attack
Attackers will attack tas against
you
many
for
and Why?
reasons. Attackers could have personal vendet-
your company, perhaps due to an unforgotten wrong
that they actually
experienced, or even one only perceived; they might also be information miners. .Although rare,
more and more corporate network companies are becoming tarwho are employed by either direct competi-
gets of information gathering groups, tors or
may
companies
that will auction off the data to the highest bidder. Attackers
also see a valuable set of resources they can use to perform computational
services. For instance, mail systems
warding email inherent
way
to
networks that
that the email
itous emails to giant It
is
just to
Internet are usually set
the attack
do
it,
of time to
is
may be
for the
up
to allow
purpose of storing and
offline at the time. Attackers
may
system works for sending practically anonymous
solic-
75%
generated.
of
It is
all
attacks
usually too
have a very
much
specific focus in
mind
trouble to break into a system
although the culprits (likely young, bored teens) seem to have plenty
do
just that.
Those breakins are more damaging
to the
ego than
to the
pocketbook, but could be deadly to your reputation. The widespread use and tribution of
makes at
it
for-
use the
groups of people.
estimated that over
when
on the
exchange services with other emailers
transit or
automated programs
that "test" the security of a
many sites Remember that the
easy for attackers to target
getting into a single unit.
flaws also help the attackers.
at
dis-
machine or service
once, or to focus special effort
tools that help
you
detect security
Aspects of Your Organization at Risk
In this section,
we
15_
few general
will discuss a
we
types of attackers. Although
drawing are mostly complete and can serve you
and prevention
and several
attack classifications
are not experts, the generalizations that in
your creation of
we
are
a detection
plan.
Attacker types
Information miners (corporate espionage). Theft of information can take many forms, from network sniffers that snoop on connections, to password crackers that login as legitimate users, sifting ically,
and sorting through
files for
private data. Typ-
the attacker will use password guessing programs or will engage in "social
upon your systems. Since they are most interested them usually takes place in FTP transfer logs or other transfer have been protocols. Some instances of data piracy delivered over the noted in the past year. (Because popular servers can run up huge logs due to mas-
engineering" to conduct attacks in files, detecting
WWW
sive traffic, system administrators
often as they should,
Intruders
sometimes don't consult
and thereby don't catch
and masqueraders.
who,
Intruders are people,
own
attempt to use your computers for their
their
ends.
An
rate.
In that manner, the intruder can safely
user discovering the attack until
programs to crack a system, cific target
it
is
too
late.
server logs as
for a variety of reasons,
intruder will generally pass
himself off as a valid user of your system, preferably a user
usage
web
potential threats quick enough.)
who
has a very low
masquerade without the
Intruders can run
real
password guessing
in order to process large data files, or to
look for spe-
information. Although similar in attack form to the information miner,
intruders often are just passing through systems.
An
assailant often will try to
cover his tracks by making several, disconnected "hops" between broken systems, thus making track him.
it
It is
harder and more time-consuming for a system administrator to very
common
for intruders to set
up
a
whole host of broken
inter-
mediary hop systems, only for the purpose of putting more distance between
them and the
target.
The
target
system
is
usually
where the intruder intends
to
do
information mining (generally for a specific purpose). Sometimes an administrator will see
an unauthorized access to a local system that merely provides a jump out
point to another computer.
Unfortunately this makes the tracking and apprehension of the criminal responsiif not impossible. Imagine if you found a user (joe), you know is on vacation in Geneva, logging in from a web server seemingly housed on another ISP's network. You see that joe is telnetting to a strange port on some machine at yet another ISP in Illinois. From this, you conclude that something illicit is underway and you would like to assist in the apprehension of the perpetrator. What do you do? This is where the trouble begins. Logically, you would begin by contacting the service provider where joe has been detected. You
ble for the breakin difficult,
whom
16
Chapter
2:
Basic
VPN Technologies
They seem to be closed you get is voice mail. You then send email to every system administrator you can find at the inbound ISP, hoping to catch someone, but of course, you
also notice that the login occurred at 2:30 a.m. PST. Darn!
and that
all
realize this to
be a
fantasy.
As you can probably extrapolate, the more hops the more complex it becomes to catch him. Last, you
attacker has under his belt, the will
almost never see outright attacks or hops through a system occurring
middle of the day, unless the assailant
is
Cyberpunks and snoops (cyberpunk kids and those belonging community). The previous two categories of attackers have a with which to keep busy, and attacker that we"ll discuss
They are may seem
it
is
there.
It
tor,
now
is
they
know
easier to detain.
is
dirty
a certain thrill these attackers feel it.
Because of
hackers are easier to spot and moni-
They tend
and tend to brag loudly they generally do no harm when they gain
less
computer simply because
wrong, and getting away with
ing attack routes
any other
targets
and
juvenile in strategy, less careful,
but there
is
machismo, these quick and
and sometimes
approach
they need to cover. The particular class of
more
like a waste,
when doing something their innate
trails
interested in breaking into your
target driven.
to the "hacker"
surgical
and information warfare. Both have well defined
to information gathering
in the
quite brave or desperate.
to take
after
fewer precautions
accomplishing a
access, they should
sting.
in cover-
Although
be dealt with
like
attacker.
Compromise methodologies Password guessing programs. This is hacker 101 territory. If you are not familiar with Crack, the most common of the tools available to the would-be break-in artist, read this through and establish a way to check your own passwords by using it.
Although
we
we
cover the
DES
encryption algorithm in detail
later in this chapter,
on password cracking. Most computers use the DES algorithm to protect the passwords on the authentication system. Unix systems, which account for the bulk of the Internet based systems, are will
prep you with
it
for this short discussion
the largest install base of
DES
clear text password, like the
authentication units. Simply put,
DES
13-character pile of seeming gibberish, such as 'HnX2a4gLaMv3k.' cally difficult to divine the original
force.
the
people are of
of
tries to a
likely to use.
common words
people's
It is
it
into a
mathemati-
try
every possible
string;
they reduce
more feasible level by guessing what sorts of passwords The Crypt password guessing program uses a dictionary
(in several languages), including a
names and
-
password from the encrypted one using brute
So password-guessing programs don't
number
takes a user's
example password "MucH007" and converts
places,
and
tries
them
ton of proper nouns such as
as the password. This
is
your system administrator trying to persuade you to use something
why you hear uncommon or
17
Aspects of Your Organization at Risk
something unnatural as having no password
a
password. Simple passwords are almost equivalent to
at all.
Social engineering. Don't consider
of the most tions. Or,
trouble."
attackers
word
traditional cracks
all
come from
threats to
to simply
is
call
up
the online front.
One
person and ask them ques-
a
send them a survey, ripe with personal queries, and a $20 bill, "for their You would be amazed at what people will tell you. This is how systems might get potential material for assisting them in piecing together pass-
we
attempts. As
take months (on a
discussed
hack of
a brute force
earlier,
fairly significant
machine), yet
password may
a
by reducing the
just
total
combi-
nations to just "real" words found in a dictionary, in turn reducing the time spent
on cracking
that user
down
you can see where using
to about 10 to 15 minutes,
personal information can drive even complex passwords of time. Semi-public data such as friends,
to a
and
phone numbers,
favorites (movies, music, stores, etc.),
password
down
to a trivial
amount
birthdays, license plates, girl-
can provide valuable resources
cracker.
Denial of service attacks. These types of attacks are usually hate or vendetta driven, because they h ave on h/ one aim, and that is to prevent you (or anyone from using your
else for that matter)
own
equipment.
nature are: flooding a network interface with
work
traffic,
A
couple strategies of
this
making use of the whole
net-
impossible, or sending specific "invalid" packets to a computer that causes
to crash several times an hour.
A good
analogy for
this
it
type of attack would be
someone wasting your whole afternoon by repeatedly calling you and hanging up. Although there is little you can do in this instance, once an attack is isolated, a system administrator can use a firewall to block inbound requests that would normally cripple the machine or the network. Unfortunately there
now
mental work being done right
that
router to dynamically block such attacks
would allow
when
a
notices
it
is
only experi-
"scanning" process or
them and
verifies that
they are valid threats.
Stupid mistakes
and accidents. A
large
percentage
of security
traced to simple oversights and accidental blunders administrators. gic attacks all
Make no
mistake, these are as deadly
things, the closer the accident to the
In other
words, filter
difficult
more impact
it's
it
will
can
be
not deadlier than the strate-
better to misspell a person's
username than
ser-
a breach.
to forget to put
router.
Computer break-in incidents are difficult to conduct. and definitely difficult to detect in the first place. Computer Emergency Response Team (CERT), a full 35% of all
difficult.
to prosecute,
According to the
gateway router or the core Internet
have and the better the chance of
back up on the perimeter
Detection can be
more
failures
the part of the system
conducted by information miners or unhappy destruction seekers. Like
vice network, the
the packet
if
on
18
Chapter
2:
Basic
VPN Technologies
high-degree breakins go completely undetected by the system administrators responsible for the equipment compromised; even higher
still,
85%
of
all
inci-
dents go unreported.
Sometimes
it
is
only by accident that an administrator notices the
toms of an alleged breakin. Strange things found strange processes running, applications found that
in
tell-tale
symp-
the temporary directory,
were not
distributed with the
Operating System, and users reporting that they are having trouble logging in or
have "forgotten" to clean
up
dramatically.
cleanup
seems tion
to
is
their
passwords somehow are
If
they are careless or
simpler.
The
When
someone
just joyriders,
detection
odds
attackers are careful will notice
you can be assured
that
If
decrease
much easier and when the attacker
is
biggest gut-wrenching feeling occurs
have not changed anything.
is left,
clues.
that
after themselves, the overall
only a minimal clue as to their penetra-
you need
to sanitize
—and quickly.
For a whole host of security related documents, including current advisories,
check with CERT
directly at http://www.cert.org.
A Quick Security Questionnaire Are you connected to the Internet now?
Do you
have
staff allocated to
Have you assessed what work staff needs?
Do you have
How many Classify
network administration?
training, software,
and documentation your
staff allocated to Internet connectivity?
hosts are connected to the Internet (directly or indirectly)?
each host
as:
definitely contains sensitive data,
possibly contains
some
sensitive data,
does not contain sensitive data
Do you
have a robust backup plan deployed?
How many
people have some type of access to private data?
Does your data
What
at all.
services
Do you have
fall
into multiple categories, requiring tiered access?
MUST you
connect to the Internet?
a disaster recovery plan?
net-
19
Firewall Deployment
be quick to respond to any threat or apparent breakin as
In closing, always try to
soon
you
as
are
you are
notified or as
sure to have a
restricted
you discover possible
as
foul-play.
The faster you are
budget and inadequate resources for your security
follow through with
efforts, try to
measures
all
that
you can take
you are too busy or uncaring, they
attackers. If they think
to pursue the
come
will
back, with
and harsher consequences.
better tricks
Be
soon
taking care of things, the less the impact overall. Even though
at
attentive to
what they were
connect the dots, you them. Don't
just
may
trying to
do
as well as
what they
did. If
you can
put yourself in front of them, and even possibly catch
disappear or that they "really didn't do anyKeep good backups, change user accounts and and develop a registry for access and authentication levels
assume they
will
thing" anyway. Just to reiterate:
passwords that
regularly,
can be deployed organization-wide.
Firewall Deployment Now. on first
to the discussion regarding the technologies
of the two techniques that
we
cover
in this
have been employed on large public networks starting place in the
firewall
development of a security
that they are generally
is
connects with a public network, fix-it-all
strategy, a firewall
of one gateway router.
many
with
Of
is
placed
for
if
you have it
it
The
the firewall. Firewalls
many
years and are a great
the point at
easy to configure;
course,
data.
is
strategy.
like the Internet.
paths to the Internet, then
ate a firewall for
at
used to protect
book
A
reason to
start
with a
which your network
inter-
Although not an all-embracing only requires the modification
WAN,
a large, multiply connected
should be noted that you
each interconnect point. The complexity of
this
will
need
to cre-
process increases
dramatically from the single point gateway to the multiple point gateway.
What Is a The
U.S.
sensitivity
Firewall?
Department of Defense, probably the world's loudest authority on data and security controls, used a system of confidences defined as security
documents. The criteria for determining how governmental computer should be protected were detailed in the fabled
levels to restrict access to top secret
a
"Orange Book."
It
stated that to secure highly sensitive data,
nect the computer to an exterior network. This
egy
that exists, but
connection
it
is
like the rest of
you;
connection to anything.
we is
just
want you
to isolate
one must never con-
of course the best firewall
too restrictive to be practical.
for extremely sensitive materials \v< >rk
is
We know
strat-
the value of inter-
to realize that the best firewall
them on
a
computer without
a net-
20
Chapter
WARNING
2:
Basic
VPN Technologies
Watch out for possible circumvention techniques. The best firewall in the world won't do you a bit of good if there is some backdoor or circumnavigational route which the attacker can take. Take care to protect the remote access systems (such as PPP, SLIP, and ARA servers) that allow users to dial directly into your private network.
Remember
avenues into your
that hackers will try to take these
site
you allow them. By avoiding the gateway firewalls, and all of your cleverly erected traps and pitfalls, a system cracker has only to dial in with a compromised account to gain access to services against which your exterior gateway firewall can't protect. if
For computer equipment that general what a firewall
is
is
connected to your network,
and what
does.
it
word, an Internet firewall serves the same purpose cars serve: to protect a certain area
spread of a walls,
fire
which
from
and exposure. An
will describe in
the origin of the
that firewalls in buildings
a potentially catastrophic explosion.
from one part of a building
in turn
we
To borrow from
is
controlled
by putting up
and The
retaining
help to contain the damage and minimize the overall loss
Internet firewall
Firewalls usually serve
is
no
different.
two main functions
for a
network administrator. The
which machines an outsider can
first is
and the services to those machines with which he can converse. The second controls what machines on the Internet an internal user can see, as well as what services he can use. A firewall is much like a traffic cop, organizing which paths network traffic can take, that they control
and stopping some
altogether.
see,
Internet firewalls usually
every packet that tranverses the gateway router, which
is
do
why
by inspecting
this it
is
usually referred
to as a "packet filtration" system.
For
we will use our large branch network as an example. We will furwe have a Cisco 2501 router and 40 workstations. Of the 40 comare servers: one FTP server, one mail server, and one web server. We
this chapter,
ther
assume
that
puters, three
C address
NIC (Network on how to set up different firewall topologies using our 40 machines and the network provided earlier. Figure 2-1 illustrates what the firewall will be doing in a raw sense for both our large branch as well as our main corporate network (at have
a full class
Information Center);
we
(207.48.29.0/24) allocated to us from the
will
be presenting examples throughout
this section
the top).
What Types of Firewalls Are There? Since almost
all
firewalling techniques are designed
choke-point control, there are only a few variations
at
around
a similar
model, a
the top level that need to
21
Firewall Deployment
204.96.12.3
204.96.12.2
Web
Server
1
|
FTP Server
204.96.12.4
204.96.12.20
Mail Server
Workstation
204.96.12.21
|
Workstation
J
L
204.96.12.1
Router Cisco 2501
Packet Filtering Router
These gateway routers block packets from or to their internal networks
either
based on some preprogrammed
Web
Server
1
207.48.29.2
Figure 2-1.
A
1
FTP Server 207.48.29.3
1
Mail Server
Workstation
207.48.29.4
207.48.29.20
rules.
Workstation 207.48.29.21
typical firewall
be explored. You are probably already familiar with the packet filtration firewall; most people are these days, given the recent attention paid to it by the news media. In
this section
we
will discuss the
operation and configuration of four
basic architectures of firewall design. There are
many
variations of the four that
you may have seen implemented, and certainly we are omitting several of the most complex and advanced basic architectures. But, we hope to give you a good familiarity with what a firewall is, how it works, how to set one up, and most relevant to this book,
how
they
fit
into the
world of the
virtual private
network.
Packet restriction or packet filtering routers Routers and computers that conduct packet
network based on
filtration
a predefined table of rules.
The
choose to send
router in
traffic to
no way makes
a
"deci-
22
Chapter
sions" based lar
interface.
whether
it
on what
is
or
in the packet,
only considers
It
why
the packet
2:
is
Basic
VPN Technologies
being sent to a particu-
the packet matches a set of parameters, and
if
should take appropriate action to either allow or deny the
transit.
The
allow and deny tables are set up and will conform to the overall network security
by the network administrator and
policies put in place
A peek
into the operation of
never even looks information to router all
a
packet
filter
works, shows us that the router
any of the packets payload, but only
at
make
were asked
how
security coordinator.
its
screening decisions. Thus, as
to allow
all traffic
the TCP/IP header
at
shown
in Figure 2-2,
from network 202.34.21.0/24,
it
if
a
would check
packets for a matching source address, and pass them across. Should a packet
be received from another network, the
filter
would disallow the
packet would be thrown away. So, in essence,
this is
how
and the
transit,
the entire operation of
this firewall affords security to the site.
202.34.21.44
38.46.182.1
^9M Internet
gateway allows only certain enter the network based on source and destination addresses
_ This -
traffic to
along with port number.
Router Cisco 2501
Packet Filtering Router
207.48.29.1
r Web
Server
FTP Server
Mail Server
Workstation II Workstation
207.48.29.2
207.48.29.3
207.48.29.4
207.48.29.20
Figure 2-2.
A packet filtration
router filter
As you can guess, a packet there's
no way
to
do user
207.48.29.21
filter
suffers
from several inadequacies.
authentication; either a peer pair
is
First
allowed, or
it's
off.
not.
Firewall Deployment
23
For example, machine 202.34.21.44 can pass mail mail server on our large network (207.48.29.4) or
who
is
be
to
send the
trying to
ZZZ Cyber
visiting the
Wouldn't
mail.
traffic it
can't.
be possible
it
and 110)
(ports 25
no
There's
for
to out-
provision for
one of our employees
Coffee Shop (owners of network 202.34.21.44) and
need to send or check mail? Further, be glad for performance reasons that the
open
router doesn't actually
all
the packets
Routers these days are asked
gets.
it
perform miracles, especially with the race for more and more bandwidth. The
to
router's job
to decide
is
away packets
send the
to
marked change
there will be a future.
We
packet
filtration
traffic,
What we're
not really to catch and throw suggesting, of course,
what gateway networks
in
look
will
is
that
like in the
believe that there will be a decoupling of routing equipment and (or
even security equipment
term. Actually, this
may
A
is
impediment
last
where
that are security risks.
for that matter)
the very near
in
already be the case.
that frequent
changes to the network
may
require wholesale
reconfiguration of the gateway router and the packet filtration firewall that lives
on
it.
This can be time consuming and disaster prone
if
uncaught mis-
either an
take leaves most of the network wide open, or a subtle change leaves the router crippled and unable to perform
its first
duty as a network
traffic director.
Bastion host
A
bastion host or screening host, as
is
it
filtering
mechanism, provided by the
security
is
provided by a packet
sometimes referred
machine
that
Yet, the
gateway allows
connected to the Internet
is
traffic to
pass to
The bastion host is in the same method it
uses both a packet
and the secured host
filtering router,
stage information flow in either direction.
to,
secured host. The primary
router, plus a
is
a security
used to
checked
as other machines.
in a less restricted fashion.
Bastion
hosts are typically used in combination with filtering routers because simple
packet
filtration
systems can't
filter
on the protocol or the application
layer.
(See
Figure 2-3 for a sample configuration.)
A
bastion host
is
much
easier than distributed servers to configure
to maintain,
because the bulk of the
bastion host
is
situated
on the
traffic is
Internal wire,
other locally connected equipment. The
needs
to
be configured on the packet
and tons
easier
being sent to one system. Since the it
site's
needs no special exemptions from security policy will dictate
which
filtering router,
will
be as
what
restrictive
as necessary.
The
majority of the bastion hosts deployed are running
ating system.
However, you could
extensively tested for
all
set
one up using
potential security leaks.
It's
a
on the Windows NT operthat has been
Unix variant
not
uncommon
at all for
an
administrator to use a combination of strategies, using both the packet filtering router as well as a bastion host.
24
Chapter
Basic
2:
VPN Technologies
202.34.21.44
A combination of packet filtering router and secured host act as a gateway
to exterior
network
clients.
Packet Filtering Router
r Web
Server
FTP Server
Mail Server
Workstation
207.48.29.2
207.48.29.3
207.48.29.4
207.48.29.20
207.48.29.254
Figure 2-3
One sures
A
bastion host firewall
of the great things about the configuration of a bastion host for security mea-
becomes
a generic "deny every-
preceded by some very specific allow statements
that pertain only to the
is
thing,"
that configuration of the packet filter
bastion host. For large and quickly changing networks, you can see that this
reduces the load of the security personnel to an acceptable amount. Adding
machines or having users
install
poorly secured equipment does not affect the
new fire-
wall or the protection afforded by the bastion host.
Of
course, having a centralized point of control does have
its
disadvantages. For
would need several machines that act as bastion hosts (making the administration of them more time consuming), or even better, a one, a large, busy network
perimeter network of bastion hosts might be required (see the next section). Each
machine needs
its
own
section in the packet filtration firewall, piling
on complex-
Firewall Deployment
ity, it
25
and with each machine comes the headache of having to test and double test Along with the need for multiple hosts to prevent network conges-
for purity.
tion, the centralization of
making
tion there, itor
it
it
information
the bastion will tend to
at
ever more important to lock
around the clock.
It
it
down
draw
attack atten-
with big bolts, and
mon-
should go without saying that a major drawback to
type of firewall configuration
that
is
can lead to
it
a tragic security
an assailant get system operator privileges on the bastion
this
hazard should
host. Thus,
a single
point of control equals a single point of failure.
DMZ or perimeter zone network A
popular ploy to separate large corporate internal networks from the hostile envi-
is to erect a "routing network" on which all inbound and outbound traffic must transit. Huge installations normally have such networks already set up so that they can effectively separate the local traffic from the metropolitan
ronment of the Net
traffic
from the wide-area or worldwide
traffic.
As you might have guessed,
ing network consists of only routers, including those both internal
connected, and usually goes by the term "backbone."
shown
in
A
a rout-
and externally
sample configuration
is
Figure 2-4.
You might be wondering why for a perimeter
zone network.
the term
DMZ
DMZ
sometimes used interchangeably
is
stands for "demilitarized zone" and serves the
same purpose as it does in areas of geographical conflict; it's a buffer zone between two hostile parties that must co-exist in close proximity. In creating a perimeter zone network, the added security you get is multifold. First, there are at least two routers involved with protecting your internal network. One router sits at the gateway to the Internet, and one sits as the gateway to your internal network. The network that the two routers share should not have any other host equipment on it other than routing equipment and trusted host equipment (used as a bastion host, detailed earlier).
The second
security feature that
comes inherent
in the
DMZ
security breech at the outside perimeter router level or at ter
network; the intruders can only
else.
To gain access
In a standard perimeter
on
packets transiting through, and nothing
would then have to crack the which should dishearten them enough to disappear.
to the internal network, they
internal perimeter router,
are placed
sniff
architecture covers a
any host on the perime-
zone construction, the most complex and careful controls
the choke-point router,
which
is
the
one
that separates the internal
network from both the perimeter network and the external network.
common
practice to erect the
tion can
be likened
less security.
DMZ
network
in this fashion,
to tiers of concentric circles
because
—each one
It
is
a very
this configura-
further out provides
26
VPN Technologies
Chapter 2: Basic
202.34.21.44
Internet
Router
Exterior Packet
Cisco 4500
Filtering
Router
202.18.1.1 A
DMZ or Perimeter Network
provides security at both the routers as well as at a
Bastion Host.
Bastion
Router
Interior
Host
Cisco 4500
Filtering
Packet
Router
202.18.1.2
202.18.1.4
r
Web
Server
FTP Server
Mail Server
Workstation
207.48.29.2
207.48.29.3
207.48.29.4
207.48.29.20
Figure 2-4.
A perimeter zone firewall example
The tightest security that you can make with a DMZ would be to disallow all traffic outbound from the internal network from the exterior router, and to disallow all
traffic
makes
all
machines
inbound traffic a
to the
that are located
inside the internal
internal
network from the
Internet.
In essence, this
two-step process. Clients on the Internet can only peer with
network
on your perimeter network and
clients that are
can't see the Internet directly; they too
need
deep
to use a
Firewall Deployment
27_
on the DMZ. You can see why this can really ruin an attacker's day. As we stated earlier, most acts of compromise are done by convenience only. The harder you make it for the snoop to snoop, the harder you middle-man through
make ier
for
it
them
you make
a bastion host
even assess the steps required
to
in their warfare,
and the
lous-
going to evaporate.
their ultimate goal, the faster they are
Proxy servers Proxies act
much
like bastion hosts,
almost completely.
We
and
some
in
firewall texts, the
two overlap computer
are using the term "bastion host" to refer to a
that acts as a staging area for information that
in transit either to or
is
from the
Internet.
A good
illustration of this
point"
"delivery
exchanger record (MX) delivery.
(which
From
email.
may
its
up
is
it
to point traffic to the bastion for
Our purpose here
is
POP
mail client.
it
which
is
interior mail host
could hold on to the
A whole
selection of dif-
manner.
in this
to differentiate the bastion host that
service,
an
redeliver the mail to
with a
be constructed
up to act as the Hence a DNS mail
typically set
Internet.
position with the firewall) or
ferent firewalls can
proxy
bastion host
traditionally set
is
mail awaiting the client to read
that of a
A
inbound from the
there, the bastion
can see due to
it
is
email
for
more of an
"in-transit"
we
just detailed
from
check-point than an infor-
mation staging area. The service that presents the most impacting trouble to a security manager's
because
it
life
is
the standard
file
transfer protocol (FTP).
It's
insecure
uses random, large-numbered ports to establish a peer to peer session
a service that operates on more than one port, much less on most any port greater than 1023, provides a real nightmare to the security administrator. To address this, a "passive" FTP session can be established (using the control and data ports [20 and 21] for actual data transit rather than one greater than 1023), but not all clients support it as well as they might.
with the
one
client.
Having
that operates
Using a proxy, as shown across a firewall. for the client,
with is
little
By
which
security to
in Figure 2-5,
setting
up
a host
is
another option for establishing FTPs
machine on a perimeter network
that acts
on the internal network, a full transit can be made give up. The FTP proxy lives on the perimeter network and
is
located
granted access through the exterior firewall to conduct FTP sessions. Special
software must be installed on the proxy so that
from an FTP
client
beyond
the interior gateway,
it
can accept incoming requests
and masquerade
as the client in
talking to the outside world.
The same
security
model using proxy
servers can be tooled using a
wall filtration router such as the Cisco PIX or the Firewall- 1 system. plete description of the PIX's abilities can Firewall.
be found
in
Chapter
9,
dynamic
fire-
A more comThe Cisco PIX
28
Chapter
2:
Basic
VPN Technologies
198.164.128.7
FTP Server
A proxy server can protect your internal network and still
allow security sensitive
sessions to happen.
FTP
WM
Proxy 202.18.1.4
i.
Router
1
Interior Packet
Cisco 4500
1
Filtering
i
1
Web
i
|_
I
Server
FTP Server
Mail Server II
207.48.29.2
207.48.29.3
207.48.29.4
Figure 2-5.
Router
202.18.1.2
FTP
Client
207.48.29.20
A proxy server used as a firewall
The reason why proxy services are becoming more and more popular is that they are more or less transparent. The client need never know that there is a proxy involved, and the server is equally uncaring; that is, as long as everything works. Because a proxy service is more like a host computer than any sort of firewall, special care site's
must be given
security policy. Plus,
to ensure that the it
is
proxy server
is
well protected by the
important to note that a proxy service
is
an addi-
Encryption
29
and Authentication
measure of protection and
tional
certainly should not
Without the shield of a packet
tion.
filtration firewall
be considered
a total solu-
keeping things segregated,
nothing prevents Internet hosts and machines on your private network from
exchanging
traffic.
VPN
Use of Fire walling in a The importance of
firewalling to a virtual private
to the point. Since a
works
VPN
is
network
is
straightforward and
an interconnection of two or more disconnected net(such as the Internet) for
utilizing public resources
transit,
it
follows that
these networks individually must be protected in and of themselves. Imagine each
network
that
needs
be placed
to
in a
VPN
as a separate bubble, with
own
its
con-
nections and users.
way, each separate bubble needs a protective wall around
Viewed
in this
make
safe from invasion.
it
the networks as
if
cific ports in the
packet
one bubble
filtering router to
to the next. Thus, a private
between two
sites.
allow the encrypted data to stream from
The VPN software provides the
tion layer routing, so that the
when
to
and secure communication (based on the
type and implementation of the cryptographic routines used) nel
it
The concept of using firewalls with a VPN is to secure they were isolated; then the system administrator opens spe-
presented to users
networks
at either
Firewall techniques are the
in
is
security
set
in a
chan-
question will "appear" to be as one
end.
line of protection in the fabric of a
first
up
and the applica-
VPN
that
must
be developed and tested into the equation before the benefits of the VPN can be fully harvested. Even if the VPN software or hardware that you might deploy has built-in firewalling that
that
you
will
just to stay
need
on the
seems
to follow
to
be everything you would ever need, chances are
some
security guidelines
on your network anyway,
safe side.
Encryption
and Authentication
The configuration and deployment of a virtual private network obviously involves more than just a packet filtration router. Otherwise, all you would have is a smoked glass window hiding your riches from the rest of the world. The real concept of this book, and that of the VPN, is the secure communication between two distinct networks over a public medium, done in such a way that they seem to be the same from either end. However, our discussion of firewalling techniques only traffic based on the makes it into your network, the disciof authentication and encryption add further protection by scrambling the
covers half of the equation. Firewalls either allow or deny
source and destination, but once the plines
conversation.
traffic
30
Chapter
2:
Basic
VPN Technologies
Encryption can be regarded as a method for altering data into a form that able by anyone other than the intended recipient, to decrypt
The input
it.
while the output
an encryption algorithm
to
upon
data by preventing an attack at
it
is
alter the data in
expensive to reverse. As with
we
unus-
typically called clear text text.
We know
this is a
such a
assailant
work too hard
or too
will discover, cryptographic routines
way
things, there are
all
is
has the means necessary
that the encryption process protects the
by making the
what's being hidden. As
use mathematics to
is
referred to as cipher text or crypt
is
mouthful to digest. The important point long to get
who
that the process
is difficult
and
sometimes several ways to skin
a banana.
Another important topic
tion
we
that
linked with cryptography
—
will discuss in this section
—
a topic that
the art and science of authentication.
is
and cryptography deal with the conversion of data
into
is
closely
Where encryp-
an obfuscated form
for transmission to a trusted party in a hostile environment, authentication
checking and confirmation of that
identity
entity,
which guarantees
with a great degree of certainty. The notion of authentication
employed by
the concepts
how
identity of a participant,
them?
It
would be
very important to
VPN. Without knowing with
certainty the
them over
and access
to
your
office
and giving them the keys
to a photocopier.
Brief History of Cryptography
A major
tenet of the art
and science of cryptography
cess must be a fairly quick
duct (otherwise (if
is
the
could you entrust a data communication channel to
like inviting
to the filing cabinet,
A
creating a
is
their claim
it
one
for the
would be too slow
owner of to
be
is
that the transformation pro-
the data (the encryptor) to con-
useful), yet computationally difficult
intercepted) for a hostile third party to reverse. Hence, most algorithms that
morph
data for security purposes
plex. In this section,
sand
feet up.
work, but
We
we
to
in a
way
that
is
programmatically com-
world of ciphers from about
cover some of the nastier mathematics that
will
we aim
do so
will explore the
do so
in a fashion that
make
five
thou-
encryption
won't leave you wanting a degree
in
higher math.
The algorithms discussed here The
fall
into three basic categories.
category of algorithms contains routines that alter the inputted clear text
first
way
go from the outputted cipher text you know the formula that altered it. These transformation programs are typically referred to as hash algorithms. Hashes don't normally have keys associated with them, as do the next two types of encryption programs. in
such a
back
that
to the inputs
The second and
it
practically impossible to
is
even
if
third types of encryption
key cryptosystems. There are
used
in
manuals and
texts,
programs are the private key and public for these encryption programs
many common names
including asymmetric and symmetric algorithms, or
Encryption
_
and Authentication
one-key and two-key systems;
hash algorithms referred to as
would
all
these terms refer to the
discussed
briefly
31
in
same
processes.
paragraph
previous
the
no-key or zero-key encryption operations because, as the
do not use
suggest, hash algorithms
The
sometimes
are
name
a key.
This brings us to the topic of randomness and
why pure random numbers
are
extremely important to the application of these cryptographic concepts. The transmission of encrypted data over a network typically requires a key exchange. This
each separate transaction between a client and a server, a new set would be produced. Although this may seem unnecessary, it would be disastrous if the same fixed keys were always used and a third party were to gain access to them, without the knowledge of either party. In essence, the key snoop would be able to decrypt all conversations until the flat key files were changed, which wouldn't happen unless the parties were on to the attack. To produce a "cryptographically strong key" on the fly, a computer must have access to a good pool of random numbers. As demonstrated on several occasions, using something seemingly random like a time or Julian second count turns out to be a horrid solution. If the attacker knows that the key generator uses a time of day for the key, it
means
that for
of keys
is
highly likely that a simple brute force approach can be used to crack the
encrypted packages
Now
let's
in
only a few hours' work.
discuss network security
and the use of encryption with networking proWe know that firewalls aren't 100% airtight
tocols to secure a data transit stream.
use social engineering like password guessing to gain
solutions: attackers
can
access, circumvent
your routers altogether by dialing
edly probe
all
avenues
still
for entry in
it's
additional layer of protection: encrypt the data transfer so that
were tapping the
they would see
line, all
is
bullhead-
in directly, or just
an exhaustive fashion. So
wise to add an
even
if
a
snoop
"garbage."
that no encryption can ever be computer processing technologies expand at a geo-
Advocates of a pure information society argue secure. Their reasoning
metric progression.
power doubles
is
that
The often
in ability
cited "Moore's
and halves
in price.
Law" says It
that this really translates into a four-fold increase
the old trick of asking a kid whether he
would
new
per
rather
computing
that every year
doesn't take a
math teacher
advance.
have $100 or
a
to see
(Remember penny dou-
bled every day for a month?)
The one
serious flaw (or design element) in using cryptography to seal
that
only a temporary
up data
is
The
real
comparison should be
key length or encryption algorithm
that
outpaces the ever increasing advance in
it
is
fix.
technological capabilities. Also, the lifetime of that data in a similar fashion.
Using small keys and weak (but
fine for data that will
be worthless
would-be cipher hack more time than
in
itself
fast)
to use a suitable
should be compared
encryption techniques
24 hours, especially since
that to crack
it.
it
is
will take a
Chapter
3J?
2:
VPN Technologies
Basic
Cryptographic Beginnings Caesar's cipher
A good
starting point for illustration
Julius Caesar. Caesar
away. Hence,
letters
swapped each
complementary cipher example, the
26
all
letters
is
the code system generally attributed to
letter in
the alphabet for another letter several
of the standard western alphabet
which would be used
letter
could represent "A," the
letter "I"
for
letter "J"
would have
a
coded transmission. For could stand for "B," and
would have such a transposition wrapping around from "Z" back to "A" again where necessary. As you can see, each letter is replaced by another 8 letters later. Hence, by knowing any letter transposition, you know them all. the letter "K" for "C."
The
Several modifications
make
random
assigning
entire alphabet
letters to
the code
more complex, but no harder to break. By letters, and not repeating them, one
stand for other
would need the entire translation table to decrypt a message, knowing the replacement distance (as in our previous example). There
a very
is
capture as
ciphered
common way
much
letter
to decrypt this type of
by frequency. is in,
then
If it
frequency chart against which to
already
know
who
you are able to determine what language the becomes a matter of merely producing a similar compare it.
are fond of the Wheel of Fortune
that in English, the
"N." Using a computer,
it
ate a letter ranking chart.
chart next to
coded message. You merely
of the transmission as possible and plot the occurrences of each
resulting clear text
For those of you
rather than just
is
most
common
game show, you probably
letters are "E," "T," "S," "R,"
and
easy to take about 100 pages of English text and cre-
From
there,
all
one needs
to
do
is
line
up
the cipher's
it.
The modulo and the importance of nonreversible math
As
we
briefly
covered
in the introduction of this chapter,
that strengthens the algorithm
is
one protection
factor
not being able to reverse the process. Using varia-
on the mathematical modulo operation is essential for this. The mod operaon two numbers produces the remainder if the first number if divided by the second. For example, 17 mod 3 would be 2. This would be because 17 divided tions
tion
have a
by 3 is 5, with a remainder of 2. It is possible would be the case if the problem were restated
as 15
An
mod
interesting thing to note about using the
large
to
mod
mod
value of zero;
operation
is
that ridiculously
numbers can be reduced dramatically by simply moding them by
number. Simply put, there
is
duced by successive mods.
A
this
5.
a smaller
a frightening regularity to a series of results pro-
possibly non-obvious truth to
mod math
is
that the
Encryption
result
and Authentication
33
can never be larger than the second operand
in the
mod
equation less one.
example (17 mod 3), without even knowing the answer, we can guarantee that the answer will NEVER be larger than 2. If you derived a number larger than 3, say 5, for an answer, then it too would have been divisible by 3, while still leaving 2 for the answer. In this manner, you can see that even
Thus, in our
first
923897958729349872356
mod
3
or
leaves only the choices of
still
1
or 2 for pos-
sible answers.
Another thing about using the modulo operation
is
that given
one of the opera-
know what the other operand was. For example, if we told you that some number mod 3 produced the answer of 2, could you guess what number we were referring to? Remember that 5 mod 3 = 2, and 8 mod 3 = 2, and 11 mod 3 = 2. You can see the pattern developing easily form here. This (even if simply put) is one reason why it is impossible to reverse a mod equation with exact certainty, and why a decent amount of protection is
tors
and the answer,
is
it
impossible to
provided to cipher equations.
Brute force attacks
A
standard attack plan for a cipher cracker
attack a
upon
the algorithm. This
is
is
assuming
to use
what
we
call
the "brute force"
that the cracker has
both intercepted
knows the algorithm used to produce it, but doesn't Depending on the amount of time that they are willing to invest in
crypted message, and
know
the key.
using a crowbar and
if
they started with a key of
all
zero bits
set,
they should
eventually find the key just by trying to decrypt the data with each successive key
(adding the next large
way
ing things this
cracked
when
it
actually
successful
all
is.
If
crack.
100 years.
the output.
the clear text
if
Some assumptions
in crack-
to identify the output as
were English
text,
then
it
being
shouldn't be
the input data
all
possible keys.
If
the encryption algorithm
second or so to calculate the cipher;
the key, the
at
must be able
brute force outputs
cycling through a
and looking
was another crypted message? This would would look like garbage, even in the event of a Another assumption is that there is time enough to spend
too hard, but what
ensure that
bit),
are that they
if
is
slow,
it
may
take
there are several billion combinations for
amount of time needed to crack the code would be between 50 are not that patient, and figure that no one else is either.
to
We
Protection Extends to Network Operations Many network
oriented operations require cryptographic concepts for security.
The thought of protecting a network conversation is almost as fundamental as having one. The protection part comes from the need to protect data that will be sent over an unknown public network. This is commonly referred to as the "transmission over an insecure channel" problem, and is almost always solved by one of two methods.
34
Chapter 2: Basic
The easiest solution is, of course, medium. By making sure that no
to
make
the channel secure
always the best approach, for several reasons.
It
media delivery system, which may be unfeasible Not to mention
ery system to the point
This
where
in large scale as
that
sometimes
in the
not to privatize an existing delivery system, the insecure channel. In other words,
form
it
way
in a
privatizing the
is
As always,
this is
no not
expensive to secure an entire
as well as impractical to alter in it
is
impossible to secure a delivat all.
the use of the virtual private network will be
develops
it
solid.
is
can be deemed secure
why
exactly the reason
is
deployed
it
by
third party has access to the physical line,
snooping can ever take place, so the connection
a timely fashion.
VPN Technologies
it
make
it
coming
years. Since the solution
must be
to secure the data itself
is
on
accessible for everyone, but trans-
(using cryptography) so that only an
affiliate
can undo
it.
Cryptosystems Hash algorithms Hash algorithms, which
are usually
known
as
message
digests or
take an arbitrarily large string and mathematically convert
it
one-way hashes,
into a fixed-length,
one-way number. Hashes are typically used to check the validity of a particular message or password. A good scenario is one where a system needs to be able to check the authentication of a particular user, but does not want to store an unencrypted password on the disk. Doing so would compromise security for every user on the whole system all at once. If an attacker were to get at the file containing all the users and passwords in clear, it would be a boon. By hashing the passwords and then storing the hash, the attacker who gains access to the password file still has nothing with which to help him. He can, at this point, engage in brute force attacks against all the users at once, which provides adequate reason for the system administrator to keep the hashed password file as safe as possible.
The process of hashing must be mentally
hash
difficult to reverse.
(e.g.,
fast, reliable,
Since there
is
and produce
is
is
funda-
the transform of a potentially large value into a fixed small-length), this
leaves only a brute force approach to try to reverse it
a result that
a loss of data in the production of the
possible for there to be
important note
is
that
it
is
many
it.
It
may
not be obvious, but
input values that hash to the
same
value.
An
computationally unfeasible to find two such values eas-
ily.
An example n
would be to take an input password, multiply it by by e (2.71828), mod the result by 7654321, and take the middle Certainly it would be nasty to reverse this process without knowing anyof a simple hash
(3.1415), divide
8 bytes.
thing about
it.
;
l ,nay[Jti(»i
and Authentication
The NIST's
and Technology) proposed message for "Secure Hash Algorithm.'
(National Institute of Standards
digest function (hash)
Ron
35
called
is
SHA, which stands
"MD2" through "MD5"
Rivest (yes. he's the "R" in RSA) created the set of
hash algorithms, which stand for "Message Digest," oddly enough. Secret key systems
The
secret
key cryptosystem takes as input
key by which the message
secret
is
message of
a
is
very
tant distinction
is
that a separate, user controlled variable
similar,
where the hash algorithm
is
and
a
the
text. In fact,
from a distance, as the hash algorithms.
transformation
the data. Further,
a variable length
transformed into the cipher
An impor-
supplied to help crypt
creates a fixed length result from a
variable length input, the secret key system operates
on successive fixed blocks of The point
input using the fixed length key to produce a variable length result.
here
is
that
hash systems are for one way checks, and secret key systems preserve
the entire clear text so that
it
can be reversed to proceed the original
text
when
needed.
Because the secret key used is
in the
equation
is
of a fixed length, using a key that
too short reduces the overall security of the system. Imagine using a key that
one byte long
(8 bits);
it
is
shouldn't take a would-be cracker too long to run
through the 256 possible keys that could be used to decrypt the data. Since the operation of crypting the message uses fixed blocks of input, using a message
block size of one byte would also be insecure because the cracker would only
have
to create a table of clear text to cipher text pairs,
that they
could send their
own
once
it
had been proven
data through the encryption algorithm.
As with hashing systems, the secret key system was designed to take a variable length clear text input and produce a random looking same size output. Further, changing the input by only one
way sage all
to trace a transform is
from
bit
should change the output so that there
bit to bit. Basically,
random should conform
to the theory that at
the bits in the resulting sequence are
Secret
times so that
it
becomes impossible
have any idea of what happened to
half are off.
that effectively disperse the bits
com-
and then mix them up by looping multiple to trace a given bit through the process it
and
along the way. Typically, during the encryp-
tion process, there are several operations that can
substitution of input bits for other input bits,
with other
no
any given time, about half of
on and the other
key cryptography uses algorithms
pletely across the resulting output,
is
the thought that a ciphered mes-
be found
in use, including the
and the swapping of
bit
positions
bit positions.
DES, which stands
was developed in 1977 by government work and com-
for the "Data Encryption Standard,"
the National Bureau of Standards for low-grade U.S.
mercial applications.
The standard was based on work done
earlier
by IBM
that
36
Chapter
was coded key
DES
the "Lucifer Cipher."
each of the eight bytes (8
2:
Basic
VPN Technologies
uses a 64-bit key, but trims the
last bit off
of
each) as an odd parity check, making the actual
bits
DES was designed
size only 56 bits. Originally,
to
be used
in a
hardware only
implementation, but since there has been phenomenal growth in semiconductor
speed
own
their
few years, it is now just as practical to conduct as a software was obviously beyond the intentions of its designers, who had
in just the last
application. This
agendas
mind.
in
IDEA, the "International Data Encryption Standard," was originally developed by
ETH Zuria. Contrary to DES, IDEA was designed when implemented as a software application. Instead
Xuejia Lai and James Massey of
be much more
to
efficient
of operating on a 64-bit message block size, with a corresponding 64-bit key size, the
IDEA code uses
result.
secret
DES
a 128-bit
key
Although the algorithm
key systems,
it
is
to transform a 64-bit
very
new compared
has proven to be quite secure,
message block
into a 64-bit
DES and even other and may even be better than with
DES and IDEA are similar in that they operate on data one chunk at a time, performing mathematical transforms based on substitutions and permutations. in the
long run. Both
Public key cryptosystems Public key systems, different things.
on the other hand,
Some do
digital
do many some do key exchange, some do and some do everything all in one. Howare a collection of ciphers that
signatures,
no encryption, do have one general concept in common with one another: there are always two components that are used for operation on the input data. One of the components is the private piece and one is dubbed the public piece. An interesting nugget of trivia is that it is irrelevant which actual piece is which mathematically, since the two are inverse operations of each other. The thing that separates the two is that the "private" piece is the part that is secreted away, while the other is distributed. Distributing both pieces would be like giving away your secret key with each bit of encrypted data you send. authentication only but
ever, they
all
Diffie-Hellman
The Diffie-Hellman algorithm, also known as the oldest public key system, was based on the problem of how two entities could agree on a secret by using only public channels. It was the genesis of RSA, which we will discuss next, but it provides only a bare skeleton of secret exchange. Diffie-Hellman neither supports
encryption nor digital signatures. tures,
what worth could
it
You might be wondering, without those
fea-
When
soft-
have?
The Diffie-Hellman algorithm is ware is programmed to change
typically its
used for quick key exchange.
key values every once
in a while, or
even with
Encryption
and Authentication
37
way of producing a secret key that both parties know, even by using a only a public channel, is required. This is where DiffieHellman excels. Imagine two famous people, on either end of a restaurant, passing notes to each other that anyone can read along the way. These notes contain
every transaction, having a quick
two parties to agree upon a secret key, but it's no one looking at the slips of paper could know what that secret trick, eh? The Diffie-Hellman algorithm is based on a principle involv-
the information necessary for the
done so
that
was. Nifty
ing the concept of a strong prime number.
weakness
Diffie-Hellman's
key
is
between the two
parties,
that
even though two parties can establish
could be a masquerader
in a public arena, there
who
a secret
middle-mans
effectively
completely unobserved. By placing himself in the path,
and by catching the right messages, the middleman doesn't need to actually know the secrets, but he can masquerade as the other, by misdirection. Suppose an interloping party
(let's call
and respond with
Ms
sage, replace his
code
for
faked conversation that
exchanged two either.
rectly
A and B
to
listen to party A's initial
be
B. Further,
M
request to B,
could copy the mes-
As, and forward the message on to B to establish a
way
as well. In this manner,
secrets (one with both
A and
M
would have
successfully
B) but without the knowledge of
think they are talking to each other, but they are really talking indi-
through M.
RSA. RSA gets lic
him "M") could
code pretending
its
name from
its
inventors: Rivest, Shamir,
and Adleman.
key system supporting both encryption and decryption with
It is
pub-
a
a variable length
key. Using a long key size increases security, but at the cost of performance; like-
wise, a short key
is
quick to compute, but
is
less secure.
The RSA
algorithm, as
implemented, typically uses a 512-bit key, with an upper range of about 4K Larger keys than that It's
nice to
know
become unwieldy
to use given today's
bits.
computing power.
that as long as the underlying principles of the algorithm are
no one has been able to break the fundamental math problem power increases, it gives both the cracker and the encryptor more firepower.
safe,
meaning
that
of factoring quickly, then as computing
Unlike private key encryption, the message block length
(i.e.,
the size of the
chunk of message to be operated on) is also variable. Unlike DES and IDEA, RSA's message block length can be almost anything. However, it must be equal to or smaller than the size of the key to prevent an easy security breach via a brute force search of the possible ciphered alphabet. Regardless of
message block
size,
the cipher text block size will always equal the size of the key.
Because RSA uses the principles of gigantic prime numbers to base on, as well as
modulo exponentiation
arithmetic,
the
its
RSA algorithm
equations is
much
38
Chapter
VPN Technologies
Basic
2:
slower than almost any of the popular secret key systems (including the ones
dis-
cussed previously [DES and IDEA]).
To use the RSA algorithm, one generates what is commonly referred to as a key pair. The first step in doing this is to choose two large prime numbers. Numbers in the 50 to 100 digit range are typical. Call these p and q. Multiply them together to get the result n. From there, using mathematical magic, you would choose a number e that is relatively prime with respect to the totient function of n.' We won't bore you with the mechanical intricacies of
how
exactly this
done. Suf-
is
fice to
say that a pair of numbers
one
the multiplicative inverse of the other with respect to an equation
is
mod
n
and the
key,
From here
used.
is
set (e.dl
is
is
produced, e and
the combination of ld,n)
is
one and which
the public
you keep hidden
is
with the odd property that
is
is
1
mod
totient(n)),
the private one.
where
referred to as the private
the public key. In actuality, since one
of the other (given the equation de =
which
d,
it
It's
is
the exact inverse
doesn't matter at
The one
simple.
all
that
the private one.
The RSA algorithm used for encryption and decryption is essentially the same. Given that e and d are inverses, encryption is the process of running the message with the public key forward through the code, while the act of decryption
is
ply not running the cipher text through the algorithm backwards. In actuality,
simit
is
the process of sending the cipher text message and the private key again forward
through the system. Specifically, the encryption routine consists of taking the clear
chunk and
text
raising
it
to the
power
taking the cipher text and raising
it
of e
to the
mod
>/.
power of
and decryption
dmod
essentially
is
n.
How Secure Is It Really? Given the explosive increase rity
discussed, the
life
computing resource power every
year, the secu-
leveled against the data
DES,
The
it.
falls to a
in particular,
bits
another few years
itself is
When
ii
governed by the raw processing power
greater the
of
One
rating, the greater the threat
its
some
life
that
of an
can be
and the
discussion concerning
of the reasons for waning protection key. Although
it
faster
DES
is
that
its it
security
only uses
simple and widely distributed
on the horizon. One way
to
encrypt the inputs. The "triple-DES" standard
is
looking quite real
a positive integer. Euler's totient function
not greater than n and relatively prime to
is
cannot be considered theoretical for
yet, the possibility of creating a
this threat is to multiply
is
MIPs
has been the focus of
software brute force of
combat
previously
simple brute force attack.
into the 21st century.
56 of the 64
we
of a particular piece of encrypted data or even the
encryption algorithm
*
in
of data stored in encrypted form gets less and less secure. As
n.
is
just
defined to be the
number
of positive integers
Encryption
and Authentication
39
such an implementation, and given to the stratosphere,
it
effectively
that
increases the
it
removes any
RSA's
weak
would be
its
inability to factor a
much
easier said than done.
As
we
point
number
of possible keys
threat for the foreseeable future.
huge number
quickly. That's
discussed in the explanation of the
rithm earlier, the sheer size of the numbers that are used
is
RSA
algo-
enormous, large
enough even that it surpasses that number of bits that even large computers use to store numbers internally. Think about it in terms of how many digits you could put into a calculator. The bigger problem is that even if you could represent the numbers in a way that a computer can handle, the act of factoring is a long and tedious process without short cuts and without easy, simplifiable steps. Because of this, you could spend a great deal of time just looking through billions of numbers, and never finding a factor of Remember that if you wanted to crack RSA, the surefire way of doing it would be to recreate the original inputs used to calculate d and e. That means factoring n. We tried various attacks ourselves, the results of which were pathetic. If you wish to try your hand at it, the best of luck! //.
Use of Cryptosysterns Much
and Authentication
of this chapter dealt with security in one form or another.
everyone
is
not as nice as
we
are
the
is
main reason why
selves. Just like in the real world, security
be addressed, and re-addressed, and security
is
constantly underfoot.
is
tested,
We
this all relevant to the virtual private
virtual private
network
is
we need
rely
on being able
padlock around
paranoia.
it.
How
is
network?
just that: virtual
to fence out
to protect.
that
covered putting up fences around your data
and
private. Private,
mal word. The keys to erecting a private data exchange or
what you wish
Knowing
to protect our-
one of life's little things that needs to and probed, and redone; the need for
(firewalling) as well as using encryption to place a big
The
a VPN
in
a
being the opti-
secured data store
unwanted people and place locking boxes around
Without
But without encryption
firewalls, a it
VPN
could
exist, albeit
most certainly could
not.
with
some
Cipher routines
solve the fundamental problem of secure communication over an insecure channel in a hostile environment.
40
Chapter
WARNING
The
2:
Basic
VPN Technologies
government classifies all encryption routines as a muniwhich is to say that they consider the mathematical formulas that make the magic happen a dangerous technology. Cryptography to the Feds is in the same boat as treason, gun-running, smuggling, racketeering, and drug sales to small children. And they do not take U.S.
tions,
such matters lightly, either. You may ask yourself, how could a little code hurt the giant U.S. government or its citizens? To learn exactly why the government treats these technologies with such kid gloves, we have to look back at some historical elements. Remember the "enigma" box? It was a German code box that scrambled militaryorders sent from the high command to the field. Along a similar line, the Japanese had developed a similar code system involving a code box called "Purple." In times of war, code cracking and encryption takes on a whole new meaning, best described by the saying: "loose lips, sink ships." The protection of even simple communication is of paramount importance to the government. If all the routines developed on U.S. soil were exported abroad with no restrictions and a war were to break out. it would be unclear to our military leaders if their communications were safe.
Patents
and Legal Ramifications
Cryptographic routines are complex mathematical systems, and the people that
have created them are experts
and protect
their systems.
who have
just as tangible as real property,
law.
spent a great deal of resources to create
As any good lawyer
and
in
some
Even using some technologies could
will tell you, intellectual property
constitute a legally binding
with the software's creators, thus illustrating that you need to take care ing with any
One
and
all
agreement
when
deal-
such systems.
typical legal protection that a cryptographic creator has
contrary to popular belief,
one of the reasons why
it
is
patented, but
it
is
is
pops up almost everywhere.
All public Inc.,
Key
make
Partners (PKP) group (see Table 2-1). Obviously they
to collect license fees
and monitor
for stray
the patent. DES,
distributed royalty free,
systems are patented as well, by either RSA Data Security
which
or by the Public it
their business
usages of their software.
Patent Information
Encryption Routine |
Patent -4.218.582. expired August 19. 1997. Supposedly covers all public key systems. Patent =4.405.829. expires September 02, 2000. Covers the algorithm.
is
key (two-key)
Table 2-1. Cryptographic Patents
Hellman-Merkle
is
cases easier to support in a court of
RSA
Encryption
and Authentication
41
Table 2-1. Cryptographic Patents (continued)
Encryption Routine
Patent Information
Hellman-Pohlig
Patent #4,424,414, expires January
Hellman (expired
3,
2001. Related to Diffie-
1997).
Schnorr
Patent #4,995,082, expires February 19, 2008. rithm is based on this.
Kravitz
Patent #5,231,668, expires July 27, 2008. rithm.
The
The DSS Algoactual
DSS Algo-
In this chapter: •
Common WAN Configurations Their VPN Counterparts
and
•
Remote Access and
•
The Hybrid System
•
Cost Comparison
VPN Counterparts
Wide Area, Remote
Chart
Access,
and the VPN
Even though
book
VPN
that a
and
costs
network
this
is
is
about
benefits, in very general terms, to
(in
which you
which users
networks, we're prepared to admit
virtual private
not always the best networking solution. This chapter compares
dial
lease dedicated lines
up banks of modems
at
a central site). Trade-offs to
consider
include configuration time, staffing, coordination of resources, and actual tary costs for
all
In this chapter,
mone-
the pieces.
we
will explore
some examples
access configurations, comparing them to their
For the most
its
two older alternatives: a wide area between sites) and remote access (in
part,
you
will not find
of traditional
VPN
WAN
and remote
counterparts.
hard costs here, as they change so
few weeks. What you
much
that
where the VPN diverges from the traditional WAN or remote access implementation, where resources may be diverted for other projects, and where your company will need to concentrate resources to implement the VPN. we'd have
to revise this chapter every
will find
is
Common WAN Configurations and Their
VPN Counterparts
Figure 3-1 depicts a typical
WAN
company. The two
connected via a 56K-bps leased
sites are
provider. Each site has a router,
ning
Windows NT/95
encapsulated
42
some number
for this example),
in TCP/IP.
line
through a Telco
of servers and workstations (run-
networked with the NetBEUI protocol
At either site there
is
a
would include monitoring and maintaining various and sundry other duties of an NA).
duties
the
using a dedicated lease line from a telephone
network administrator whose this
connection
(in addition to
Common WAN Configurations and Their VPN Counterparts
43
Remote Central Office
Network
Figure 3-1
A
Network
typical leased line connection between two enterprise networks
This scenario would incur a hefty setup fee from the telco for the leased
Each network administrator would require no more than 20 hours to
set
line.
up
the
connection, including actually ordering the lines and equipment, proposing and clearing this implementation through
management, coordinating
installs
of lines,
and physically configuring the connection. Recurring costs would include charges for the leased connection and maintenance of the connection by the
work as
As time goes by, of course, other costs would surface, such
administrators.
upgrade costs
line
net-
(e.g.,
equipment,
lines,
and time) and equipment replacement
costs in the case of a failure.
The
right
looks a
panel shows the same setup using a virtual private network.
lot like
operation. Data
the is
WAN,
carried
the
VPN
differs greatly in
back and
forth over the Internet
networks via an encrypted tunneling network protocol
VPN
costs about the
same amount
running, but the operating costs are
as the standard
much
less.
The
staff in its
between the
(in this case,
WAN initial
are finding the right solution, getting the right software,
work
Though
it
implementation and general private
PPTP). The
solution to get
up and
costs for the
most part
and
your net-
training
deployment and operation.
In the proceeding sections,
and
a similar virtual private
the
specific
needs
of
we
break
down
the costs of a leased-line based
WAN
networking solution. As always, you should evaluate
your organization
and compare them with available
resources before undertaking any major network installation. So keep in mind that these are
examples. Your mileage
may
vary.
Corporate Office to a Small Office/Home Office Connection The Small Office/Home Office (SOHO) is a "compact to mid-sized" scenario. It would fit a small to medium organization with a regional office in another county or neighboring state, or a small company with an employee working from a home office. The main focus here is low bandwidth and low maintenance. Both VPNs
44
and
Chapter 3: Wide Area, Remote Access, and the
WANs
first,
and resources needed
are about equal at this level in the costs
implement them.
WAN
In the following sub-sections, the
VPN
scenario
is
to
discussed
followed by the virtual private network scenario.
Telco needs
The
WAN
connection could use an ISDN line
ing area of the main office.
frame relay ally
line
would be
If
the
SOHO
the best bet.
does not incur per minute charges
charges
if
month
ISDN
The big if
local
ISDN
calls.
A
the
SOHO
out of
is
local,
Some
frame relay
is
within the local
this area,
difference
the call
you're connecting long distance.
minute charges for
if
is
is
that
a leased
call-
56K-bps
an ISDN line usu-
but would rack up such
calling
areas
line typically
do incur per
has a
flat rate
per
charge.
more bandwidth (up to 128K-bps with a single basic rate ISDN line). lines would be needed to even get close to this level of bandwidth (112K-bps). The choice between the lines comes down to estimated usage and relevant charges associated with usage, as well as bandwidth needs to the remote site. Note that an ISDN or frame relay line is required on both ends of the
Two
offers
56K-bps leased
connection.
A VPN
could use either frame relay or ISDN, but the line would connect to a local
Internet service provider. If both offices are in the
same
calling area, the
should be used, reducing the odd nature of Internet routing
town routing
traffic to
each other across the country).
If
(that
is,
same ISP
ISPs across
the remote office
is
out-
side the calling area of the central office, the ISP chosen from both sides should
be connected
to the
same upstream
cantly reduce Internet routing issues virtual private
Internet provider,
if
possible. This will signifi-
and increase the speed and
reliability
of the
network.
Equipment required
VPNs and WANs
require the
same types of equipment
at this level.
ISDN
terminal
adapters and routers or frame relay routers are available through such manufacturers as Cisco Systems, Farallon, Motorola,
Network administrator
issues
Expertise for a traditional tor's skill set. Total
and Ascend Communications.
WAN
setup should be in a typical network administra-
time for both sides of the connection should not exceed 10
down the best equipment, ordering lines, and conThese types of connections do not usually require much recurring maintenance, as they tend to stay solid once properly configured. As much as 10 hours a month in maintenance time is standard, even if there are hours, which includes tracking figuring the connection.
major connection or configuration problems.
Common WAN Configurations and Weir VPN Counterparts The main
failure point
in
this
kind of connection
is
they don't tend to communicate with their customers
maintenance or the use
45
the telco provider, because
when
lines are
undergoing
end users in scenario would not
completely. Other related issues involve training
fail
and general maintenance of the connection,
as this
need a dedicated network administrator on both ends.
When
implementing
work engineer virtual private
needs. as
Initial
much
upstairs,
be
is
a virtual private
network, the
initial
consideration for a net-
research and training to get a general understanding of
how
network works and setup of a
VPN
will
it
fits
consume
how
a
with the organization's networking
a significant
amount of
time, possibly
as 20 to 40 hours including research, training, pitching the solution
and actually implementing the network. Recurring maintenance shouldn't
significantly
different
from the
WAN
solution (presented earlier) with
two
exceptions: the ISP used and security of the VPN. Both issues are discussed at length later in this section. However, suffice to say that the network administrator
can add about 5 to 10 hours a month to the
mum
WAN
maintenance estimate
(a
maxi-
of 20 hours total per month), dealing with security and Internet service pro-
vider issues.
Upgrade path
The
WAN
scenario supports a central office connection for one remote office of
around 50 to 100 nodes on the network. (More than 12 nodes on the ISDN example
would require
WAN,
a Class
C ISDN
or for multiple remote
to Multiple
Remote
site
router). For
more nodes than
this, a
very busy
connections, see the next section, "Central Office
Office Connections" for details.
To upgrade either the WAN or the VPN, you'd have to practically re-engineer the whole connection. ISDN and leased 56K-bps frame relay require additional lines to increase the amount of bandwidth, so multiple ISDN, Basic Rate Interfaces (BRIs), or more 56K leased lines would be required. In addition, the equipment listed above is not able to handle more than a single line. Thus, for an upgrade the central office would need a router that could accept more than a single connection.
Likewise, remote offices that
want more than 128K-bps over ISDN or
new or additional hardware. The equipment listed in the sections "Central Office to Multiple Remote Office Connections" and "Remote Access and VPN Counterparts" would all be appropriate when upgrading. In addition, the network administrator would need more time to evaluate the need to upgrade and move to new services. No network software changes would be required for either connection method, though with some virtual pri112K-bps over frame relay would require
vate network packages (such as AltaVista Tunnel), the server software must be
upgraded
to accept
more tunnel connections.
46
Chapter 3- Wide Area, Remote Access, and the
Central Office to Multiple
Now
move to WAN, the
we'll
you use
a
Remote
Office
VPN
Connections
a larger organization with a variety of connectivity needs.
If
resources needed are similar to the "compact" example, only
more expensive. With
a virtual private network, the resources stay the same.
Aside from some software purchases, such as the AltaVista Tunnel, there are no
upgrades or size-related costs other than capacity to handle multiple connections in general. In Figure 3-2, the left
connected to a central
offices are
shows
similar
a
panel depicts a typical
WAN
which satellite The right panel
in
office via direct leased lines.
setup using an Internet service provider to connect remote
The unbroken line represents a local digital connection to the ISP, while broken line shows the virtual private network as it travels over the Internet.
offices.
the
Satellite
Satellite
Central Office Office
Office
Network
Network
Network Central Office
Network Local Digital
\
Connection
1
Leased Line
Leased Line
Local Digital
Satellite Satellite
Office
Office
Network
Connection
VPN: j
Network Satellite
Office
Network
Figure 3-2. Leased lines versus
VPNfor a WAN
Telco needs
A
large
WAN
needs substantial bandwidth. To connect multiple medium-to-large
networks to a large corporate network, nothing site suffices.
T3,
or an
ATM
less
than a fractional Tl
at
each
we
suggest multiple incoming Tls, a single
connection, depending
on incoming bandwidth requirements.
At the central network,
Telco costs related to these connections include
initial
setup fees, local loop
Common WAN Configurations and
Their
VPN Counterparts
47
charges (for the line from the local telco central offices to the various recurring transit fees for the lines. Costs can be significantly reduced
frame relay connections, but
guaranteed bandwidth
if
is
and
sites),
by choosing
required, frame relay
is
not the best choice. Frame relay networks compete in the "cloud" for bandwidth,
and most connections are not guaranteed to achieve their full speed end to end. For more reliable bandwidth, the more expensive option is a leased point-to-point connection. The hardware, described here, supports either frame relay or point-topoint connections.
A VPN
has similar bandwidth needs. Both the central network and the various
outgoing
their
traffic.
However, these connections are
service provider, thus reducing the local loop costs.
T3, or
typically to a local Internet
and possibly the recurring
Try to keep options for easy upgrades available.
ATM
connection
is
the best
as needed, to the various sites If
line.
Bandwidth
will
A
line
scalable fractional Tl,
be allocated dynamically,
and charged accordingly.
the organization runs Internet services (such as web, mail, or other servers)
various networks, and
is
traditional
overhead such as encryption and additional
users.
net services are offered to network users, such as
could use a
lot less
on
attempting to support a large virtual private network, the
bandwidth needed may be more than the
bandwidth than
tion requirements constantly, as this
sat-
networks need high speed connections to the Internet simply to support
ellite
a
WAN
scenario due to extra
only common Interweb browsing and email, a VPN
However,
WAN. You have
to
if
monitor network connec-
any network administrator knows. With
evaluation should take into account the heavier
traffic
on the
a
lines the
VPN,
VPN
requires.
Equipment required With high-speed network connections comes high-end access equipment, and with that comes high cost in both routers, hubs,
and the
like are
initial
investment and ongoing support.
Though
not often prone to failure, they do have a short
life
About two years is the most an IP router can exist before the next generation makes it almost obsolete. Multiple remote network concycle as far as technology goes.
nections over leased high-speed data lines require high-end IP routers. For example, Cisco's
2500 series routers and Bay Networks Access Router series could sup-
port fractional or
full
Tl connectivity over frame relay or point-to-point. For
higher bandwidth connections, such as fractional or series routers or various carrier class switches
standards.
The
central network's
dollars.
Of
T3 or ATM,
equipment costs could run
dreds of thousands of dollars. For the
few thousand
full
Cisco's 7500
from Cascade, Ascend, or Cisco are
satellite offices,
the cost
in the tens to
would be
at
hun-
most a
course, bandwidth needs of the various networks, hard-
ware vendors, and other issues
affect these estimates.
48
Chapter 3: Wide Area, Remote Access, and the
For a VPN, connection equipment speed. The model could look very
is
VPN
again dictated by connection method and
much
depending on the Internet connections
the
same
at the
as the previous
WAN
solution,
various sites and the central net-
VPN diverges in two areas: servers and ISP connection equipment. Depending on the software chosen, the organization is limited to three platforms.
work. The
If
PPTP
is
implemented on the ISP side of the connection, the organization
is
lim-
Windows NT and Macintosh for software clients. Windows 95 has been rumored to have a PPTP client in development, but it has not appeared as of this writing. If PPTP is implemented on the organization side, both client and server software must be acquired. The server software is supported only by Windows ited to
NT
4.0, either the
Server or the Workstation version. Clients are limited to Win-
dows NT and Macintosh, If
the AltaVista Tunnel
as above.
is
used, the server software
is
available for various flavors
BSD Unix or Windows NT. Clients are available only for Windows NT or Windows 95. If the organization currently runs its operations on platforms other than these, then a switchover may involve more cost and hassle than the benefits of of
the
VPN
are worth.
Network administrator
issues
The main issues here are related to scale of the operation. Every satellite network will need one or two full-time network administrators to support the initial WAN implementation, the ongoing operations, and the users. Ordering and coordinating lines and equipment, configuring the network, troubleshooting, stabilizing it, and documenting changes could take as much as 40 to 80 hours per site, including the central network. Ongoing administration, support, reporting, and other duties should require 160 to 200 hours per month during normal operation. In the event of a problem, such as failed connections or equipment, is
much
this
hourly estimate
higher.
For a virtual private network connection, the biggest benefit could also be the big-
Most ISPs that service connections of this scale are compeand knowledgeable about engineering the connection. These ISPs will assist, support, and in most cases, actually include the setup of the connection as part of gest hindrance: the ISP. tent
their services. This will
reduce the hourly cost of the setup for the network admin-
and may not increase the monetary costs significantly. For this reason, selection of an ISP should be a number one priority when considering using a viristrators,
tual private
network.
Additionally, as
we
noted
in the
ISP for the central network the
same backbone
and
(e.g., Sprint,
preceding section, you should choose the same all its satellites,
BBN
if
possible, or ISPs connected to
Planet, etc.). This will reduce the
network
routing problems that affect the speed of the virtual network between the sites
Remote Access and VPN Counterparts
49
and may take the network completely down on occasion.
you use PPTP, on reduce the workload of the network Also,
if
the organization should consider selecting an ISP that supports this protocol
equipment. This could significantly
their
administrator, as there will tially
be no PPTP servers to support; user support
outsourced to the ISPs support
An
estimated time commitment for a connection on this scale
the
WAN
is
be evaluating and selecting an Internet service provider Ongoing administration and support of the virtual private
initially will
for the multiple sites.
network should not exceed 100 to 150 hours a month, taking the ISP
about half that of
connection (about 20 to 40 hours). The majority of the network adminis-
time
trators'
essen-
is
staff.
doing
is
much
of the user-end support.
tent or their connections faulty,
mal hours
month
a
to support
your
If
into
account that
the ISP proves to be incompe-
administrators can expect double the nor-
site
and maintain the VPN.
Upgrade path
The upgrade path T3 or
tional
for either the
ATM
WAN
central office are the extent of
cost options
on the horizon, such
as
still
VPN
satellite
upgrade
the technology settles, however, this likewise, are
or the
connection to every
is
currently limited.
potential.
full
or frac-
ADSL, the costs may change somewhat. is still
the
at
With other high-speed, lower
an unknown.
VPN
There are currently only two proven
settling.
A
network with multiple T3s
Until
software solutions.
VPN methods
that
support the organization from client to server: PPTP and the AltaVista Tunnel.
Remote Access and VPN Counterparts Figure 3-3
shows
to the central
private remote access running over
network
is
a dial-up access server
handled by a remote access
and the physical
lines, as
normal phone server. All that
lines. Traffic is
required
well as remote access devices
is
on
modems or ISDN routers. This connection method is well The remote access server can support dedicated nailed up connections or on-demand scenarios, whereby a remote office or roving user dials up to the network as needed.
the user
end such
tested
and
But
there
if
as
versatile.
is
some
distance between the satellite sites and the central dial-up phone charges could be massive. Likewise, if the organizahigh-speed digital connection for remote access, like ISDN, few car-
point, long distance
tion requires a riers
guarantee a straight
digital
connection end-to-end across the country. With
dial-up frame relay, the connection
cated to the connection
is
is
digital
end-to-end, but the bandwidth allo-
not guaranteed end-to-end.
Large or small, remote access to the corporate network
and on-demand,
in
comparison to the
WAN
is
typically
low bandwidth
scenarios earlier in this chapter. Very
50
Chapter 3- Wide Area, Remote Access, and the
VPN
Central Office
Network
Local Analog
Remote Access
or Digital dial-up
Server
Home
Offices
Dedicated Digital
Connection
Large Remote
Small Remote or Local Network
Roving
Network
Individual
User
Figure 3-3
A
typical remote access setup
few remote users should need relay. If
they do, the solution
is
more
a
a
WAN
industrial
connection than ISDN or frame
scenario.
Remote access configurations could be as simple as a terminal server connected network with a few dial-up modems, or as complex as a Cascade remote access server with several hundred dial-up users connecting simultaneously. As any ISP knows, either situation has its own share of headaches.
to the corporate
With a comparable dial in to
virtual private
network solution, the remote users and
offices
an ISPs dial-up access equipment and run PPTP or the AltaVista Tunnel
The central office runs a VPN server. If an ISP supports PPTP on its dialup access server, the central office doesn't even need a VPN server. Any limitations on this type of setup lie with the Internet service provider, and its underlocally.
standing of virtual private networking.
Why
does an organization need remote access to
their
network? Answering
this
question will lead the planning network administrator to the best solution. Traditional
remote access
is
clearly
enough
for a "backdoor" dial-up connection
only by network personnel in emergency situations, hours.
A VPN may
or
may
not be better
when
staff
like a
network outage
telecommuted on an
quent or recurring basis and need access to the network. The effective in the frequent case
where Joe Guy
Sales
is
VPN
is
most
used after infre-
cost-
out of town closing a deal
Remote Access and VPN Counterparts
and needs
to access the corporate
5/
__ network
for contracts, pricing changes, or
com-
munication.
Remote access
is
usually far
more
work. In the next two sections range and the large tively
site
costly than
we
implementing a
virtual private net-
present examples in the small to
range. Within each section,
we
medium
how
also outline
site
to effec-
use a virtual private network to provide the same solution and reduce costs.
Small
to
Figure 3-4
Medium
shows
Site
Breakdown
a typical small site offering remote access.
the equipment for a private remote access system, tual private
network using an ISP and the Internet
remote access setup uses an
a small
and the
NT
for
or Unix server
The
right
left
panel shows
panel shows a
remote access.
On
the
virleft,
and four modems or ISDN
On the right, a similar setup uses a virVPN server and ISDN router connection to
terminal adapters with appropriate lines.
network, which includes a The remote users would connect
tual private
an
ISP.
access the central network through the tems, and require a certain istration. Overall,
cost
and
amount of
less resources.
more
ISDN and
over the Internet. Both are viable sys-
expertise
on the
part of the
network admin-
the virtual private network solution has the advantage of lower
The
private remote access
there are fewer "middlemen" with
involves
to their ISP via analog or
VPN
whom
administration time and
equipment
to deal.
is
more
fail safe,
as
However, remote access also
more headaches
to
keep operational. The
following sections touch on the major parts of the small remote access system.
For remote access, their roving users,
this
organization requires only four dial-up
modem
lines for
telecommuters, and emergency back-door connections for the
network administrator. The system described here should support 8 to 10 dial-up users with comfort, and as In the
VPN
solution, the
many
as 16 to 20 during
number
of users
the ISP about the ratio of users to
work down percentages, VPN when they need
is
peak
dial-in times.
not an issue, except with the
modems, peak time usage
statistics,
to ensure that the organization's users
ISP.
Ask
and
net-
can reach the
it.
Telco needs All that is
or four lines
required for the remote access scenario are the four analog
ISDN
are
initial
charges incurred either on the actual phone
area,
lines
bill,
or
on
a long distance credit card
company reimburses. Since few carriers guarandigital connection end-to-end for ISDN data calls outside of a local calling the organization that needs high-speed digital connections will have more
used by the remote users tee a
phone
depending on the speed desired. Costs associated with these installation, recurring monthly charges, and any long distance
lines,
interest in the
VPN
that the
solution.
52
Chapter 3: Wide Area, Remote Access, and the
Central Network
—
1
I
VPN
Central Network
Windows NT or Unix server running remote access services
VPN I
Modems
\
\
I
or
server
ISDN
terminal
ISDN router
adapters
/
\
I
\
ISDN
telco line
Internet Service
Provider
Remote users with
either
terminal adapters or
analog or ISDN
Remote users with
ISDN
modems and
modem
lines.
Figure 3-4. Alternatives for a small
to
either an
ISDN
router/terminal adapter or analog
medium
and ISDN
line.
office
Telco issues with a virtual private network hinge mostly on the ISP chosen for
need The central corporate network will need a dedicated digital connection such as ISDN to an ISP. Alternatively, the firm could maintain a dynamic (on-demand) connection to the ISP, where the ISP initiates the call to the corporate site when traffic deseach of the connecting users. Each
some
site
or person that wishes to connect will
sort of dial-up access line (analog or digital) to
tined for the corporate network
is
connect to the
ISP.
detected.
The VPN, like any Internet service, is only as fast as the slowest connection between the user and the server. The main consideration when choosing an ISP for the virtual private network is its capacity and ability to support the number of is imporusers to which your organization expects to need connections. Again, tant to evaluate the ISP based on your company's needs, and not some abstract it
set of criteria. If
it
is critical
that users access the corporate network, then
an ISP
with a low user to dial-up line ratio must be chosen. Currently, the industry stan1 modem, but peak times and network down percentages are number of ISPs out there. An ISP whose primary business focus corporate Internet access would have its peak times from 8 a.m. to 5 p.m. on
dard
is
12 users to
as variable as the is
Remote Access and VPN Counterparts
53
one specializing in regular home weekends and from 6 a.m. to midnight weekdays.
the weekdays, whereas
on
the
users, look for
users
would see peaks
VPN
Also, with roving
an ISP with a strong national presence or 800 dial-up access.
Equipment required For a private remote access system, the organization needs only a
Windows NT
Unix server with remote access server software and four analog modems. system
be
is
If
or
the
up with digital incoming lines, four ISDN terminal adapters would The difference in price for ISDN is about twice that of the modem including terminal adapters on both ends; however, the speed is much set
required.
solution,
greater (up to 128K-bps).
With a
network, the organization needs access equipment for the
virtual private
The central office would most likely ISDN terminal adapter or router such as the Digiboard Datafire, Motorola Bitsurfr, or Cisco 1000 ISDN router. The remote connections could have either ISDN terminal adapters or analog modems to connect to their ISPs. The central office would still require a Windows NT server to run PPTP or the AltaVista Tunnel Workgroup server. However, if PPTP is run on the ISPs dial-up access equipment, the Windows NT server would not be remote connections and the central
dial in
over ISDN to an
ISP,
office.
thus needing an
needed. Unless being used for multiple services or a heavy
dows NT
VPN
load, the
Win-
A
Pen-
server can be as bare bones as the operating system will allow.
tium 100 with 32
MB
of
Network administrator With remote access,
a
RAM
could serve the needs of 20 remote
VPN
clients.
issues
network administrator faces several challenges
system running and to provide support to
its
to
keep the
Modem connections modem compatibility (i.e.,
users.
are
buggy at best, experiencing regular problems with getting two modems to talk to one another), the quality of phone lines, and general end-user problems. The small setup described in this scenario should not have
many
problems, but some will occur. The network administrator should expect to
spend 10
to 20 hours a
month on end-user
support, general maintenance of the
remote access system, and general administration of the remote access
A
virtual private
network also has
its
server.
host of administrative nightmares.
primary concerns of the administrator are security and dealing with the
covered most of the ISP issues
in the previous
The two
ISP.
We've
Telco needs" section. Security
is
a
bigger problem. In order to maintain the integrity of the private network, the network administrator will
have to monitor the
tion very closely. Users
password and
digital
key
VPN
systems logs, error reports, and other documenta-
must be trained extensively integrity, confidential
in security issues,
such as
information procedures, and other
54
Chapter 3- Wide Area, Remote Access, and the
The main anxiety
security issues.
for the systems administrator
network. There
nothing to say except that these people will
is
your system, but
common
from being an easy
that the entire
is
have a shot
Internet's host of criminals looking for a challenge will
VPN
your private
at
break in to
try to
sense and precautions will save your private network
target.
Upgrade path
Remote access sites are a lot of work to upgrade. More modems or ISDN terminal adapters, more phone lines, and a larger and faster server are required as the number of end users reaches 10 to 20. Eventually, the remote access site might require an ISDN PRI, which is a Tl line provisioned for 23 incoming ISDN or analog channels.
With
a PRI, the
remote access
site
would
these, as well as other products, can handle multiple digital
some
require
sort of
such as an Ascend 4004 or a US Robotics Total Control
server,
and analog connections simultaneously. With
assign your
Windows NT remote
remote access
server.
Both of
incoming PRIs and take both
this sort of server,
access server to other duties, as
it
you can is
re-
no longer
needed.
A VPNs
upgrade
much
is
more thought about usage and need only increase its bandwidth The AltaVista Tunnel Workgroup server soft-
simpler, but requires
bandwidth. With a VPN, the remote access
site
to its ISP and upgrade its VPN server. ware runs on a graduated scale, whereby the
neous connections with this threshold, the
that accepts
PPTP
site gets a certain
a certain server package.
number
of simulta-
As the number of users cross
system administrator must upgrade the software to a version
more connections.
not so picky, and as stated before, doesn't even need to run on the
is
remote access upgrades
site's
when
the
server.
number
Network administrators should begin considering of VPN users on a 128K-bps ISDN connection
exceeds 20 simultaneous connections. Virtual private
networks are by
their nature
slower than other Internet services, as
the software does a lot of encryption and decryption to
complain more loudly
their capacity (thus is
a fractional
Remote
when
on the
fly.
they are unable to transfer data
Users will begin at
about one half
l4.4K-bps for a 28.8K-bps user). The next step up from ISDN
Tl connection to the
ISP.
See the section "Central Office to Multiple
Office Connections," for cost considerations associated with this type of
connection.
Large
Site
Breakdown
Figure 3-5 shows a slightly larger organization configured for remote access on
network on the
The
remote access
the
left
and
the
left
panel can support up to 23 dedicated or 40 to 50 on-demand analog or
a virtual private
right.
large
site in
Remote Access and VPN Counterparts
digital users. All
access hub.
55
connections to the central network are managed by the remote
The VPN
in the right
panel can handle about the same amount of
users with lower costs, especially in equipment,
The main changes from
the small and
medium
management, and
line charges.
cases are the additions of lines,
equipment, and personnel to manage both. With a VPN, a high-speed connection to the ISP for the central office
on
a single ISP for the
whole
network
is
organization.
the points of contact (and points of failure)
essential. Equally essential
You want
is
to settle
to take extra care to
on the ISP connection.
If
ent ISPs provided service to a widely spread organization, the problems multiply and
merge
together, giving the
network administrators
when
fits
reduce
several differ-
would
trouble-
shooting.
Central Network
Central Network
Remote Access Hub
VPN
server
Router
ISDN PRI channelized for up to 23 digital or
T1 connections to
analog connections
local
ISP
Internet Service
Provider
Remote users/networks
with either
dedicated or on-demand digital or
analog dial-up services via or
modem
ISDN/Frame Relay router
Figure 3-5- Alternatives for a large
Remote users have the same options and require the same equipment as the remote access users, however, they would connect to a local ISP
site
Telco needs
A remote
access
site
of this size requires at least a
one
to five ratio of lines to
remote networks are connected via a dedicated line. These lines, obviously, would have to be sanctioned only for use by that network, and in most cases stay connected 24 hours a day. users. In Figure 3-5, several
56
VPN
Chapter 3: Wide Area, Remote Access, and the
The example network has about 75 users of the system and 25 incoming lines. Two of these lines are dedicated ISDN connections for nearby branch offices, and are connected 24 hours a day. The remaining lines are carried on a digital primary rate ISDN line, which allows for 23 analog and/or digital connections simultaneously. The only other addition to the telecommunications puzzle piece is an 800 access line for roving users. Though this is an expensive route, an 800 number
is still
cheaper than a long distance
call for traveling
With the VPN, the minimum connection to an ISP
users of the system. a
is
Tl
nected to a large national Internet service provider, such as
line.
BBN
The Tl
con-
is
Planet or Sprint.
Connecting through such a large ISP may be more costly, but it will save the system administrator headache time when there is a problem. National ISPs tend to have better support and some sort of notification system when problems are anticipated or emergencies arise. Another benefit of staying with a national ISP availability of service for all users
and remote
Most national ISPs also offer other Internet services such as
on an
up. This allows the organization to standardize
have ISP
a single point of contact. For the
is
required, though
it
need not be
is
the
sites.
remote
offices,
modem
or
Internet carrier,
ISDN
dial-
and thus
an ISDN connection
to the
a dedicated connection unless the site's net-
work is large or has an around-the-clock need for a constant connection to the main office or the Internet. The individual users have a choice of either modem or ISDN dial-ups, as the individual need requires.
Equipment required With an incoming Tl PRI
line,
the central office needs a remote access hub. Such
hubs, like the Total Control Access
Hub by
U.S. Robotics or the
Communications, are designed to handle incoming
equipment also user account
network administrator the convenience of administra-
offers the
tion tools such as
SNMP
monitoring of network usage, as well as capacity and
management options
Modems and ISDN
4004 by Ascend
lines like these. This type of
lacking in a
home-grown
or smaller solution.
adapters are built in and upgradable, removing the hassle of
maintaining racks of modems, or ISDN TAs, or routers. In addition, access hubs
can handle multiple incoming Tls, making upgrading incoming capacity easier
and more
affordable.
you'll want for such a setup include an SNMP workstation or and an accounts management server (which could be on the same computer). Accounting for users via logs, databases, and other data will assist the administrator greatly in tracking usage, troubleshooting problems, and generally
Other equipment server
keeping
The
all
the users,
sites,
central office in the
and networks
VPN
"Central Office to Multiple
in order.
scenario looks very similar to the previous section
Remote Office Connections" among our
earlier
WAN
Remote Access and VPN Counterparts
The
solutions.
central office
2501, with
a Cisco
57
needs
a
CSU/DSU and
Tl
needs appropriate hardware to connect to
Network administrator
A
Each connecting
issues
medium-sized remote access network
dedicated
staff
just
site
their ISP.
is
nightmare for a system
a general
administrator-^) ust ask any Internet service provider. With multiple
connection types, user
such as
class Internet Protocol (IP) router,
appropriate software.
profiles,
and unplanned
incidents, you'll
need
and varied a full-time
The remote managing accounts and
to administering the remote access network.
access staff should be responsible for supporting users,
the capacity of the network, and coordinating communications, upgrades, and
maintenance. Remote networks certainly require a network administrator
who
maintains the dial-up or dedicated connection to the central office and acts as a liaison
between the end users on
that
network and the support
staff at
the central
office.
With the VPN, most of the network administrator's support functions are reduced because the ISP maintains .support a itor
VPN
of
up
and maintain the
rest.
Of
to
this role.
A
small administration staff should be able to
200 users. The network administrator's main job
central office's connection to
management and and approximately 30 hours
course, account
administrator,
its
security are
a
ISP. still
The
is
mondo the
to
ISP should
the big issues for the
month should be earmarked
for this
task.
Upgrade path With either the remote access solution or the VPN, upgrading the system to support
more than 200 users should warrant
site for
200 users
is
business to ensure that this point, the
careful consideration.
A remote
access
very complex, and requires a dedicated section of a given all
users,
equipment, and
lines are properly supported. At
organization should consider outsourcing the entire operation to a
company that specializes in such solutions. If the organization is non-technical, management should consider outsourcing even before the site grows to 200 users. The benefit and convenience of having remote network access are overshadowed by the ever growing costs. These are greatly reduced by outsourcing.
A VPN
has the
"soft" costs
ment, and
initial
come
VPN
benefit of a reduced cost to start up. But as
into play, such as higher
bandwidth needs
it
grows, other
to the ISP, equip-
software upgrades. In addition, the size of the staff needed to sup-
port and maintain the various systems
and
train
and support the end
users,
grows
exponentially.
The system administrator should consider next section,
when
a hybrid system, as described in the
the time to upgrade approaches.
58
Chapter 3: Wide Area, Remote Access, and the
VPN
The Hybrid System The hybrid system
is
a combination of
network. In most cases, the
VPN
investment
in a stable
mented, the remote access system
WAN
nected via the
VPN
system
or remote access
WAN
and
a virtual private
or remote access option. For
an organization may have an outdated remote access system but main-
instance,
tain a significant
as the
WAN
replaces the
is
is
VPN
wide-area network. As the
phased
out, leaving several sites
is
imple-
still
con-
VPN. This scenario could occur at any scale, new phenomenon. But for the large organization, the hybrid
and others
such a
is
via a
the best bet to preserve both versatility and
stability.
Needs A
hybrid system requires an extensive full-time
staff
dedicated to the support of
remote networks and users and the maintenance of the various connections. Again, as stressed in the previous section, "Upgrade path," resources might be
used more effectively by selecting an outsource vendor, particularly zation trol
is
not technology based. However,
WAN/Remote Access
of the
if
the organi-
if
keep conwork most effec-
the organization chooses to
system, the hybrid system will
tively.
How
the administrator equips,
a small,
the
medium, or
number of
users
large
staffs,
on each.
In this
for multiple purposes, reducing
wise, there
Should the
access, or
way,
staff,
a hybrid system
VPN
solution,
equipment, and
is
identical to
depending on
lines
can be used
overhead and creating a redundant system. Like-
a built-in fail-safe plan that backs
is
WAN
up one system with
another.
or remote access system experience recurring or long-term prob-
lems, sites that use the
VPN
stated above, the into
and maintains
WAN, remote
WAN
could switch to the
VPN
could be an upgrade solution that
in the is
interim.
And. as
gradually introduced
an organization's system without disrupting normal operation of the network.
Cost Comparison Chart Okay,
we
said
intended not
we
to.
wouldn't
show any hard
However, the editor vetoed
costs in this chapter,
and we
fully
that proposition. So, Table 3-1 dis-
plays a cost comparison chart that gives a very round figure for each category of
each of the solutions detailed
monthly recurring trator's,
in this chapter.
The telecommunications
figures. Staffing represents a
or a network
staff's,
prices are a one-time charge.
lines are in
percentage of a network adminis-
time spent on that aspect of their job. Hardware
59
Cost Comparison Chart
Table 5-1. Cost Comparison Chart for WAN, Remote Access,
and VPN Sites
WAN
Remote Access
VPN
Telco lines
$200/mo
$500/mo
$200/mo
Equipment
$1200
$5000
$1200
Sys admin
$1250/mo
$1250/mo
SJSuo
Telco lines
$7-10K/mo
$10K/mo
$5K/mo
Equipment
$100K
$80K
$10K
Sys admin
$25K/mo
$25K/mo
$12.5K/mo
Small to
Medium
Site
mo
Large Site
In this chapter: •
The Topology
•
Central Office
•
Large Branch Office Small Branch Offices
• •
Remote Access Users
•
A Network Diagram
A VPN Scenario
you haven't gotten enough of the virtual private network yet, this chapter will real, live, up and running VPN. We've covered the theory and some general cost-to-benefit analysis, and now we move on to some actual products, workIf
cover a
ing in a production environment. like
Ascend and Cisco, you
tions just
may
better
fit
Though we have used
specific products here
will find in later chapters of this
your enterprise. In other words,
this
book
that other solu-
VPN
law,
manufactures and
sells
chapter
isn't
an example.
The Topology We'll call the
computer
About
company
parts
and
a year ago,
in this case
study Immediate PC.
It
peripherals.
Immediate PC made the commitment
communications between concerns were security,
cost,
to standardize
its
network
various sites over the Internet. Naturally, their main
its
and
reliability-.
Communication needs at Immediate PC are like those at most companies. Sales agents in the field must communicate with manufacturing managers at the factories to order and ensure production of needed stock. The retail store arm of the
company
also
communicates with shipping, manufacturing, and several other
departments on a daily try
basis.
must send and obtain data
Various factories and other divisions across the counto
keep
their operations flowing.
Several different platforms and networking protocols are used at various levels of
the organization. ers
and Windows
The main corporate network
NT
or
Unix servers of various
60
Windows 95
flavors.
is
comprised of Windows
NT
serv-
workstations. Additionally, there are several
Remote access users use
a variety of operating sys-
61
Central Office
terns,
and
a
few departments within the main corporate networks use Macintosh
systems.
Without the Internet, the flow of data and the cost associated with private lines
and dial-up access were crippling operations and losing profits. Having decided to use advanced technology to remedy the situation, Immediate PC migrated gradually
from private
and remote access
lines
to a controlled
use of the Internet.
move
Research, training, and various levels of approval preceded the
to virtual pri-
vate networks. After this
move, the company reduced the
cost of
network communication and
What emerged was the virtual private network diagram at the end of this chapter. The chosen
resolved several communications problems.
network detailed
in the
architecture links a central corporate office with various remote offices, large small, in addition to a gaggle of
The following
and
remote access users.
what was needed in connections network solutions.
to the Internet,
the natural source of information about products
and operations.
sections detail
equipment, software, and
virtual private
Central Office This center Security
is
is critical.
Besides the VPN, several other Internet services are centralized
here, including the corporate
based Intranet
is
web, email, and FTP main
also centralized at the
servers.
The company web-
office.
Network Connections two Tl connections through two separate national redundancy and gives other connecting sites a variety of network paths over which they can reach the central office. The Tl connections allow enough bandwidth for all sites to connect to the central network with adequate response time over the VPN, in addition to supporting these other
The
central office maintains
Internet providers. This provides
services.
Hardware and Operating System Routing a robust
traffic
from the Tl, the company has a Cisco 4500 Internet
and expandable router
work. Likewise,
it
that
router. This is
can handle up to four Tls for a large net-
can encapsulate and route a variety of protocols, from IP to
AppleTalk. For broad coverage of
dows NT PPTP and
AltaVista
Unix server and an Ascend
VPN
Tunnel
MAX
solutions, the
main
office
is
running Win-
servers, separately. Secondarily, there
remote access hub, both running PPTP.
is
a
62
Chapter
4:
A VPN Scenario
VPN Package The
central office
must run three
variety of solutions.
network VPN. For
The
this
large
VPN
branch
high-bandwidth
servers to give their connecting networks a offices require a stable task, the
and
fast
network to
Cisco PIX firewall was chosen. In
addition to being a robust firewall solution, the PIX enables the various large net-
works
to encrypt data traffic
the routing
power of
from one network
to the other. This,
combined with
the Cisco routers, allows each network a variety of proto-
while maintaining a secure connection. The AltaVista Tunnel would not have
cols,
the bandwidth for the central office's needs, though offices.
it
can support smaller branch
Other remote users dialing in either to the Internet or one of the branch
offices are using
PPTP
Large Branch Office Other Internet services are maintained
FTP
at
some
of these offices, such as
web and
servers.
Connection Large branch offices around the country are connected to the Internet via fractional
Tl or
work
activity.
Tl, depending
full
on the
size of their
networks and the
level of net-
Their network connections are through one of the two national pro-
viders that connect the central office to the Internet. This allows for a faster con-
nection to the central office. This strategy will lessen the amount of "hops"
necessary to reach corporate office Internet connections.
Hardware and Operating System A
Cisco 2500 router
is
needed
to support fractional to full
these networks. Sites that use either
dows NT
or Unix server for users
PPTP
who
Tl connections for
or the AltaVista Tunnel maintain a Win-
dial in
and smaller networks.
VPN Package The Cisco PIX central
office
These branch
Firewall
and
to
is
implemented
at
these locations for connections to the
provide network security against Internet-based attacks.
offices also
use either the AltaVista Tunnel or PPTP for their remote
access users, and for incoming connections from the small branch offices. Users
run the AltaVista Tunnel client or PPTP client on their
95 workstations.
Windows NT
or
Windows
Remote Access Users
63
Small Branch These
Offices not major web pages — access —but they need continuous and
host very few resources to share
sites
that
certainly
are expected to get lots of hits
reliable
to
the larger offices.
Connection The smaller branch
offices maintain either dedicated or
tions to their Internet service providers.
Some
dynamic ISDN connec-
use the same national ser-
offices
vice provider as the corporate office, while others use providers
who
maintain
upstream connections through the same networks as the corporate
office.
Though
this
does not
affect the basic functionality of the
and
reliability
of the connection
between
VPN,
it
does increase the speed
sites.
Hardware and Operating System Small branch offices use the Ascend Pipeline 50 nection.
The Ascend supports PPTP, and
addresses. ing
PPTP
A Windows NT
or Unix server
ISDN
router for their Internet con-
routes Internet is
utilized at
traffic for
each
or AltaVista Tunnel users and to connect to the
site to
up
to a 255 IP
validate incom-
VPN.
VPN Package PPTP
Either
or the AltaVista Tunnel server and client are used at each
accessing the VPN.
ment
at
tions,
some
Those
each
sites
site,
The preference
as needed. Since the AltaVista
sites that
run
MacOS
or
site for
up to the IT departTunnel has some platform limita-
for either solution
is
left
some unsupported version of Unix use PPTP. BSD/OS Unix servers or Windows NT
running AltaVista use either
servers to establish tunnel connections.
Remote Access Users Remote access users include those on
the road or those working off-site.
Connection A
variety of connection methods are used, from ISDN to analog phone lines and modems. Again, the best scenario is to have all remote access users connect through the same national provider as the rest of the corporate network or through a provider who is on the same network.
64
Chapter
4:
A VPN Scenario
Hardware and Operating System Individual users can have a variety of platforms from
Windows NT
or
Windows
95 workstations to Unix to MacOS. ISDN routers, terminal adapters, or analog
modems
could
all
be
in use.
VPN Package PPTP
client or the AltaVista Tunnel client could be used by end users VPN. Since the central office supports both solutions, the remote access user would choose one of the two based on supported platform and/or
Either the
to access the
personal preference.
A Network Diagram shows connections from the Internet to the central office to a large and a remote user. It is important to note the flow of traffic throughout the VPN. PPTP and the AltaVista Tunnel both validate incoming traffic. This encrypted traffic passes through interposing firewalls and is relayed directly to the PPTP or Altavista Tunnel server. The traffic is then routed to the desired internal network node. The Cisco PIX firewall, on the other hand, immediately directs authorized traffic to the network and thus provides a faster backbone for the VPN. Figure 4-1
office, a small office,
Regardless of the need or resources available,
network connections over the der of
this
book
Internet, there
is
if
your enterprise requires secure
a solution available.
The remain-
details the three solutions alluded to in this chapter: Cisco PIX,
the AltaVista Tunnel, and PPTP.
65
A Network Diagram
KEY: AltaVista
Small Branch Network
AltaVista Tunnel or
Cisco
PPTP Server
PPTP
Ascend Pipe 50
Remote Access User Running AltaVista Internet Provider
B
or
PPTP
client
128Kbps
Internet
Internet Provider
B
Internet Provider
A
Fractional T1
Full T1
FullTI
Internet Provider
A
I
Cisco PIX Firewa
Firewall
" Cisco 2500
Cisco 4500
AltaVista
PPTP Server
PPTP Server
Tunnel Server
Large Branch Office
Figure 4-1.
VPN hardware,
software,
and protocols
Network
In this chapter: •
How PPTP Works
•
Advantages of PPTP
•
Limitations of PPTP
Implementing the Point-to-Point
Tunneling Protocol The
was
Point-to-Point Tunneling Protocol (PPTP)
from Ascend Communications, ration,
and ECI Telematics
U.S. Robotics,
PPTP and how
Chapter
we
6,
it
might
Configuring
gain here and apply
and it
fit
developed by engineers
Corporation, Microsoft Corpo-
network between remote
to provide a virtual private
access users and network servers. In this chapter, of
jointly
3Com
we
will discuss the functionality
network scenarios. In
into certain virtual private
Testing
to setting
PPTP up
a
Connections, we'll take the knowledge
VPN
using PPTP.
The companies that created PPTP banded together the same time that the PPTP Forum was formalizing
to
form the PPTP Forum. At
their specification, Cisco
was
independently developing the Layer 2 Forwarding protocol (L2F). Working with the Internet Engineering Task Force, the
PPTP Forum and Cisco
set aside their
differences to create the Internet draft specification for the Level 2 Tunneling
Protocol (L2TP), a L2F,
new
and allows them
core protocol that combines the best features of
to interoperate; this allows
either or both without worrying about integration. it
PPTP and
network administrators
As
this
new
to
deploy
standard emerges,
should be easy to upgrade PPTP to L2TP, and the configuration should be very
similar.
PPTP is available on currently shipping versions of Windows NT Server 4.0 and Windows NT Workstation 4.0 as part of Remote Access Services (RAS) NT's dialup networking software. Microsoft's PPTP support for Windows 95 is included in
—
their
Dial-Up Networking Upgrade Version
LAN PPTP
Windows NT
1.2.
Microsoft has also released LAN-to-
and Remote Access" software (code named "Stronghold"). The first MacOS PPTP client was announced in April 1997 by Network TeleSystems {http://www.nts.com). Called TunnelBuilder, it offers full PPTP support, including NT domain login and data encryption, and connections for
costs $99 per copy.
66
in their "Routing
Network TeleSystems (NTS)
will also
be releasing Tunnel-
How PPTP Works Builder for
May
67
Windows
Windows
95,
for
Workgroups, and Windows
of 1997. Since Microsoft doesn't plan on supporting
versions of
Windows,
this
systems in
allows users with legacy systems to run PPTP.
There are also a number of hardware devices
These devices are known terminal servers,
3-1
PPTP on down-level
that support
PPTP out of
the box.
alternatively as remote access servers, remote hubs,
and remote access switches.
simply as remote access switches, because
In this chapter, we'll refer to
that
term
is
them
prevalent in the industry
and best describes what they do. There are a number of remote access switches among them Ascend's MAX line, the 3Com/U.S. Robotics Total Control line, and ECI Telematics' Nevada. These are typical brands used in ISP
that support PPTP,
modem and ISDN
points-of-presence and corporate networks to terminate
PPTP
included as part of
is
all
of these products free of charge
—no additional
calls.
acti-
vation fees are required.
How PPTP
Works
Tunneling protocols essentially make square pegs
fit into round holes. Imagine you have a round pipe and you want to send a cube through it. If you try, the cube is just going to get stuck, or isn't going to fit at all. The way to get around this is to encapsulate the cube within a sphere, then send it through the pipe. In other words, you take something that your transport medium can't work with, and package it within something it can. All computer networking works this way, in one fashion or another.
As a tunneling protocol, PPTP encapsulates network protocol datagrams within an IP envelope. After the packet ters
from
it
encapsulation
that is
on
point
that
it
allows
is
encapsulated, any router or machine that encoun-
will
treat
many
only medium, such as the Internet. The that
it
revolves around Microsoft
an IP packet. The benefit of IP
as
it
different protocols to
RAS
Windows NT
first
for
be routed across an
thing to understand about
Windows
IP-
PPTP
is
NT. RAS allows a network
modem bank as a dial-in RAS users takes place on the NT server, and a network session is set up using the PPP protocol. Through the PPP connection, all of the protocols allowed by RAS can be transported: TCP/IP, NetBEUI, and IPX/SPX. To the RAS users it appears as though they're directly connected to the corporate LAN; they notice no difference between RAS through direct dial-in and RAS over the Internet. administrator to set
up
a
server with a
point for remote users. Authentication for the
PPTP was designed
to allow users to connect to a
RAS
server from any point
on
have the same authentication, encryption, and corporate LAN access they'd have from dialing directly into it. Instead of dialing into a
the Internet, and
modem
still
connected to the RAS
server, the
end users
dial into their ISPs
and use
68
Chapter 5: Implementing the Point-to-Point Tunneling Protocol
PPTP
up
to set
cation
common
initiate
over the Internet. PPTP and RAS use authenti-
a
the
first,
PPTP-enabled remote access switch
second, the user
is
There are two
to create a virtual private network.
scenarios for this type of VPN: in the
an ISP with in the
a "call" to the server
and encryption methods
a remote user
that
is
dialing into
connects to the RAS server;
connecting to an ISP that doesn't offer PPTP, and must
PPTP connection on
their client
machine.
Dialing into an ISP that Supports Dialing into an ISP that supports
PPTP
PPTP
requires three things:
•
The network with which you want to establish a VPN must have a PPTPenabled Window NT 4.0 RAS server. By "PPTP-enabled" we mean that the PPTP protocol is installed, and there are VPN dial-up ports set up in RAS. The
•
Your ISP must use a remote access switch
server must also be accessible from the Internet.
MAX
Ascend
that supports PPTP,
such as an
4004 or U.S. Robotics Total Control Enterprise Network Hub.
(Together, these
two products make up
a significant portion of the ISP dial-up
hardware market.)
Your ISP has
•
must enable In the
NT
first
to it
have decided
for
example, the central corporate office
4.0 server running
conference
in Atlanta,
PPTP
to actually offer the
service to users,
PPTP and RAS. A and wants
sales
Denver has set up a Windows manager named Sara N. is at a
in
to dial into the corporate
network to check her
email and copy a presentation from her desktop machine. Her remote system
Windows 95
laptop computer with a 28.8Kbps
local dialing area of her office, but has
modem.
told the IP address of the to her user profile.
When
the sales
The
manager
RAS server IP address dials into
at
is
is
a
She's obviously out of the
an account through a national ISP that
supports PPTP through their U.S. Robotics remote access switches. The ISP
it
and
your account.
Sara N.'s corporate office,
was
and has added
204.96. 12.60.
her PPTP-enabled
ISP,
the following events
occur: 1.
Sara
N.
initiates
a
Networking. She logs
call
in
into
her
ISP's
POP
using
Microsoft's
with her username, "saran." Doing so
Dial-Up
starts a
PPTP
session between the ISP's remote access switch and the corporate office's server, 2.
whose
Sara N.'s
IP address
PPP session
is
is
tunneled through the PPTP stream, and the
server authenticates her username Essentially, this all takes place just
via a directly
NT
specified in Sara N.'s user profile as 204.96.12.60.
connected modem.
NT RAS
and password and starts her PPP session. as if she were dialing into the RAS server
How PPTP 3.
Works
69
The PPTP session can then tunnel to use. In Sara N.'s case,
TCP/IP
the protocols that dial-up users are allowed is
one of those protocols, and the NT RAS
server assigns her machine the internal corporate IP address of 204.96.12.129.
Looking
at
Figure 5-1, you can also follow these events and see
original Point-to-Point Protocol (PPP) session
This figure at
PPP
is
a simplified version of
and corporate LAN,
the ISP
Call
what the
for instance,
is
where the
client's
encapsulated by the PPTP tunnel.
actual topology looks like
—routers
have been removed.
Remote User: "saran"
PPTP
Call
ISP
Remote Access Switch
(w/PPTP)
RAS Server (PPTP-Enabled)
i
r Corporate LAN
Figure 5-1. Dialing into an ISP that supports
Once
the
PPTP
is
completed and the
access to the corporate network as
her email and access
files
if
PPTP sales
manager
is
authenticated, she has
she were on the LAN. She can then check
on her desktop machine using
file
sharing.
Chapter 5: Implementing the Point-to-Point Tunneling Protocol
70
Dialing into an ISP that Doesn't Support PPTP In order for an ISP to support PPTP, they must be using
switches
we mentioned
at
one of the remote access
the beginning of this chapter. Not every ISP uses those
brands of remote access switches, and some don't use these devices they might use
some other
modems connected
to a multiport serial card in a
Instead
terminal server device. Others might have the appropriate hardware,
but choose not to implement
PPTP because they
technical support for tunneled connections. that
at all.
Unix system, or
may
your ISP
want
don't
be forced
to
Whatever the reason,
not offer PPTP; however, that doesn't
mean
there's a
that
you
to
do
chance
can't use
it.
first, you again need to have a Windows NT 4.0 on your network, and it must be accessible from second, your Windows NT or 95 client machine must have the PPTP
This scenario requires two things:
RAS
server with
the Internet;
PPTP
installed
protocol and Dial-Up Networking installed. We'll use Sara N. for this
an ISP
example
as well. This time, however, she's dialing into
that doesn't support PPTP. In addition, she's
her laptop computer (as of
this writing
yet available). The sequence of events PPTP enabled provider is as follows: isn't
1.
for
Sara's trip
NT
4.0
on
Windows 95
for a tunneling session with a
non-
Sara dials into her ISP using a dial-up networking profile for her account and establishes a standard
2.
running Windows
—PPTP
—and
PPP connection.
PPP connection has been made, Sara uses Dial-Up Networking again PPTP RAS server at the corporate office. In this dial-up profile, however, she puts the IP address of the RAS server, 204.96. 12.60, in the phone number field, and selects the dial device to be a VPN port set up After the
to "dial" into the
through Dial-Up Networking (we'll explain 3.
A PPTP
connection
and
the
to
RAS
is
in
Chapter 6
made through Sara's PPP The RAS server then
server.
how
to set this up).
connection, over the Internet, logs her into the corporate
network using the username and password she supplied. The RAS server assigns her the internal IP address of 204.96.12.129,
and she
is
then granted
access to the corporate network.
shows you how the second PPTP PPP connection to the ISP.
Figure 5-2 initial
Again, once the rate
LAN
PPTP connection is made, she were connected to
just as if
connection.
call
is
encapsulated through the
Sara N. will have access to the corpoit
via a
network card or dial-up RAS
r
How PPTP Works
PPP
71
Remote User: Call
"saran"
PPTP
Call
witch ISP Remote Access Switch
i
(without PPTP)
Internet
r-> RAS Server (PPTP-Enabled)
—
i
Corporate LAN
Figure 5-2.
An
ISP that doesn
't
support
PPTP and connection
to
a corporate RAS server
Where PPTP Fits into Our Scenario In Figure 5-3
we
have a representation of
a corporate office
network with a Tl
connection to the Internet. The router that connects to the Internet packet-filtration firewall.
dialing into her ISP,
which
she connects to the switch, user profile. just to
A
it
starts a
is
PPTP call to the RAS server specified in her PPTP session back to the client, rather than
the remote access switch. Sara uses this line
ISP that doesn't support PPTP, call.
also a
using a PPTP-enabled remote access switch. After
is
lighter line extends the
with a second RAS
is
User Sara N. wants to check her corporate email, and
and
initiate
the
when
PPTP
she has to
session
dial into
an
on her workstation
Chapter
72
5:
Implementing the Point-to-Point Tunneling Protocol
Virtual Private
Network
204.96.12.129 (assigned by RAS)
Remote (PPTP continues client
if
User:
"saran"
to
ISP doesn t support it)
I
PPP Dial-up ISP Remote Access Switch
(w/PPTP)
Internet
Windows NT 4.0 RAS Server with PPTP
T1 Line
Router
1
&
email Server
Firewall
1
204.96.12.25
204.96.12.1
204.96.12.25 I
I
Corporate LAN
Figure 5-3
On
A full diagram
of a
PPTP connection
over the Internet
the corporate router and firewall, the TCP/IP port
on which PPTP
socket (1723) must be open to both inbound and outbound the network Internet
is
traffic,
traffic.
If
creates a
the rest of
protected by a firewall that disallows inbound and outbound
then a single point of entry to the
protected by the user-based authentication.
LAN
is
established,
which
is
How PPTP Works
73
Dissecting a
PPTP Packet
The PPTP encapsulation technique the Generic Routing Encapsulation
protocols over the Internet
PPTP
version,
known
as
(if
is based on another Internet standard called (GRE) protocol, which can be used to tunnel
you're interested, see RFCs 1701 and 1702).
GREv2, adds extensions
for specific features
The
such as Call
ID and connection speed.
A PPTP
packet
is
made up
of a delivery header, an IP header, a
GREv2
header,
and the payload packet. The delivery header is the framing protocol for whatever medium the packet is traveling over, whether it's Ethernet, frame relay, or PPP.
The
IP
header contains information essential to the IP datagram, such as the
packet length and the source and destination addresses. The
GREv2 header
data that pertains
on the type of packet encapsulated, as well as PPTP-specific to the connection between the client and server. Finally, the
payload packet
the encapsulated datagram
contains information
is
itself.
In the case of PPP, this data-
gram is the original PPP session data that is sent between the client and server, and within it can be IP, IPX, or NetBEUI packets. Figure 5-4 illustrates the layers of PPTP encapsulation.
Delivery Header IP
Header
GREv2 Header Payload Datagram
Figure 5-4. The four layers of a
PPTP packet
being transported across the Internet
The encapsulation process
The encapsulation process
for a user dialing into
an ISP
that supports
PPTP
is
as
follows: 1.
2.
The user dials into the ISP's remote access switch using PPP. Between the client and the remote access switch flow PPP packets that are surrounded by PPP protocol-specific frames being delivered. At the switch, the media-specific frames are stripped away, and the
open up
call trig-
PPTP tunneling session over the Internet between itself and the PPTP-enabled NT RAS server specified in the user's profile. The remote access switch encapsulates the PPP payload packet within a GREv2 header, then an IP header. Finally, it receives a delivery gers the remote access switch to
a
header before going out of the switch. Throughout the packet's journey, the
74
Chapter
is
Implementing the Point-to-Point Tunneling Protocol
may change depending on the type of media may go from Ethernet,
delivery header
the packet
5:
being sent. For instance,
it
PPP over ISDN, and destination at the RAS server.
to Ethernet again, to
reaching 3.
its
The RAS server
treats the
It
incoming PPTP connection as an incoming
PPP
client
modem
call.
It
and the GREv2 header from the
then handles the PPP connection as
the user were coming in over a the
to frame relay,
to Ethernet yet again before finally
strips off the delivery header, the IP header,
payload packet.
through which
it
normally would
The RAS server using whatever authentication method required on connection.
if
validates
the
server: Microsoft encrypted authentication, encrypted authentication, or
RAS any
authentication type (including clear text). 4.
Before packets from the client reach the LAN, PPP framing the enclosed
IP,
NetBEUI, or IPX datagrams. Figure 5-5
is
is
removed from
a diagram of those
protocol layers that are active during each portion of the connection for dialing into ISPs that support PPTP.
Virtual Private
Client
Network
—
N
'•
is
Managing
-^
It
standard versions available on most sys-
dis-
cusses how to select routing protocols and
tems.
how
hensive book ever written on sendmail.
to configure protcols to
common
1
mail Version 8.8 from Berkelev and the
a practical guide lo selling up and
maintaining a production network.
Networks
IP
This new edition of sendmail covers send-
situations.
esoteric but equally important issues Like
work equipment and vendors and how
handle most
also discusses less
It
how
the
sendmail
Although the book focuses on Cisco routers, and gives examples using Cisco's IOS. the principles discussed are
common
is
program
and away the most compre-
leam
to all IP
This
—
in
—and most
it's
one of the
a complete sendmail tutorial, plus extensive
One
•
Configuring
•
Connecting to external networks, and configuring exterior
common
on understanding sendmail; Part Two covers the
installation,
Evaluating equipment and vendors Selecting routing protocols
is
a
building,
and m-i configuration of sendmail; Part Three covers
practical issues in sendmail administration; Part
interior protocols (RIP, OSPF.
last
UNIX system administration.
book provides
tutorial
Designing an IP network
•
in
difficult utilities to
reference material on even aspect of the program. Part
Topics covered include:
•
cop
that acts like a traffic
used on almost every I'NIX system,
great uncharted territories
networks, regardless of the vendor you choose.
•
far
routing and delivering mail on UNIX-based networks. Although
to evaluate net-
up a help desk.
to set
It is
Four
a
is
com-
prehensive reference section; and Part Five consists of appen-
EIGRP)
dices and a bibliography.
protocols (BGP)
In this
•
Ongoing network management: troubleshooting and maintenance
file
•
Security
and privacy issues
second edition an expanded
tutorial
demonstrates hub's cf
and nulldient mc. Other new topics include the #error
MIME
ery agent, sendmail's exit values.
headers, and
how
deliv-
to set
up and use the user database, mailertable, and smrsb. SolutionVirtual Private
Networks
~^~"~^^~^^^~
i
L nets,
oriented examples throughout the
Paul
'barlie Scott,
1st
it
olfc
Edition February
ISBA
l
onh
Historically,
1998
56592 large
to
make do
lines.
sendmail Desktop Reference By Bryan
Smaller
1st
with the relatively
Edition
74pages, 1SBX 1-56592-278-6
- companies
on the road. How do you provide a low
plete overview of the latest version of sendmail
while
in
(V8.8). from -cost,
secure elections to
is
a virtual private network: a collection of technolo-
—
connections
build a VPN.
It
starts with general
and how a VPN
like firewalls
book
It
fits
I
MX
you how
concerns
in with other
to
definitions,
sendmail, second edition.
like costs, configura-
networking technologies
thai are available for
how
to
Windows
such as PPTP and L2TP. the AltaVista Tunnel, and
the Cisco PIX Firewall
OREILLY to order.
800-998-9938
•
[email protected] • http://www.oreilly.com/
Our products are available at a bookstore or software store near for information:
800-998-9938
—
all
con-
nn
and from
packed
ator of sendmail. Includes extensive cross-references to
plan and
continues with detailed descriptions of
and use VPN technologies
NT and
tells
macro
to
declara-
into a convenient, carry-around booklet co-authored b\ the cre-
can be easily used by anybody
that
logging in lrom anywhere. This
install
command-line switches
commands, from options
features to debugging switches
gies that creates secure connections or "tunnels" over regular
Internet lines
com-
have to go outside their private
network for your organization?
The solution
tion,
& EricAllman March 199'
Costales
This quick-reference guide provides a
figuration tronic
own
untnisted Internet. Nowadays, even large
because so many people telecommute or log
they're
solve your
cross-referenced with
~
companies could
ed from expensive leased
had
is
section numbers.
U9
afford secure networks, which they creat-
folks
book help you
sendmail problems. This new edition
S Mike Era in
•
707-829-0515
•
you.
[email protected]
Network Administration DNS and BIND, 2nd Edition
(continued)
Networking Personal Computers with TCP/IP
By PaulAlbitz &
—
Cricket Liu
j
2nd Edition December 1996
1st Edition July 1995 408 pages, ISBN 1-56592-123-2
438 pages, ISBN 1-56592-236-0 This
book
net's
Domain Name System (DNS) and
is
software, the In this
ue is
This
a complete guide to the Inter-
Berkeley Internet
Tetworking Personal
the
Name Domain (BIND)
bility will
PCs
Computers
to
offers practical information as
a TCP/IP network and
servers.
It
and
its
UNLX
discusses the challenges you'll
offers general advice
on how
edition, the authors contin-
face
BIND version
deal with them, provides basic TCP/IP
to describe
which
4.8.3,
configuration information for
included in most vendor implementations today. In addition,
you'll find
book
well as detailed instructions for attaching
LINK implementation of DNS.
second
By Craig Hunt
complete coverage of BIND 4.9.4, which
be adopted as the new standard
in the
in all
some
of the popular
systems, covers advanced configuration topics
proba-
of specific applications such as email,
near future.
to
PC operating
and configuration
and includes a chapter on
on integrating Netware with TCP/IP. In addition to covering the basic motivation set ics,
up the BIND
software, this
including using
become
a "parent"
someone
else);
behind
DNS and how
book covers many more advanced
to
top-
TCP/IP Network Administration, 2nd Edition
DNS and BIND on Windows NT systems; how to (i.e.,
how
to
"delegate" the ability to assign
use
DNS
to set
names
up mail forwarding
Craig Hunt 2nd Edition December 1997
By
to
correctly;
TCP/IF
debugging and troubleshooting; and programming. Assumes a basic
knowledge of system administration and network management.
630 pages, ISBN 1-56592-322-7
Getting Connected: The Internet at
complete guide
up and
to setting
running a TCP/IP network for administra-
56 K and Up
tors of
By Keiin Doud 1st Edition
2nd Edi-
TCP/IP Network Administration, tion, is a
networks of systems or lone
systems that access the Internet.
June 1996
home
starts
It
with the fundamentals: what the protocols
424 pages, ISBN 1-56592-154-2
do and how they work, how addresses and routing are used
A complete guide
for businesses, schools,
and other organizations who want
to
move
con-
data through the network, and
how
to set
to
up your network
connection.
nect their computers to the Internet. This
book covers to
everything you need to
make informed
decisions,
to providing
package
really
services,
online,
it
shows you how
such as a World Wide
Web
to set
that
implements them.
Domain Name servers,
speeds, such as frame relay, ISDN, and leased lines.
Once you're
new second
It
edition discusses advanced
BGP) and the gated software
contains a tutorial on configur-
ing important network services, including PPP, SUP, sendmail,
down-to-earth explanations and configuration
instructions for telecommunication options at higher than
modem
setup, this
routine protocols (RIPv2, OSPF, and
from helping
you figure out which services you
need
Beyond basic
know
Service (DNS),
some simple
BOOTP and DHCP
configuration
setups for NIS and NFS, and chapters on
troubleshooting and security. In addition, this book
up basic Internet
mand and
server. Tackles issues for PC,
including />/>/>(tf, dip, gated,
Macintosh, and UNIX platforms.
is
a com-
syntax reference for several important packages
named, dbcpd, and sendmail.
Covers Linux, BSD, and System V TCP/IP implementations.
Using
& Managing PPP By Andrew Sun March 1998
1st Edition
400 pages Covers
up
(est.),
all
(est.)
ISBN 1-56592-321-9
aspects of PPP, including setting
dial-in servers,
debugging, and PPP
options. Also contains overviews of related areas, like serial communications, setup,
and
DNS
routing.
O'REILLY" to order:
800-998-9938
•
[email protected] • http://www.oreilly.com/
Our products are available at a bookstore or software store near for information:
800-998-9938
•
707-829-0515
•
you.
[email protected]
Windows NT Administration Windows NT in a Nutshell By
Essential
By .Eleen
1st Edition June
^bk
1997
K
364 pages. ISBN 1-56592-251-4 Anyone who user, or
installs
Windows
adds a printer
is
not). This
book
approach
to
Windows NT
home
solving, with an
in a Nutshell will
user as
will
it
be
new tagged
features a
Ik
Ji -^ Windows W
or
T
System
callout
Administration
documenting the 4.0 Gil as well
examples of
as real-life
problem
it
command
be as useful
1
This
as important
as possible.
D. Ritchey
to
inclowsNI Backup .S; ResK \\
a range of topics, but seldom do they give
you enough information thing. This
mal books)
book
to
master any one
is different.
lody Leber
1998
250 pages
ISBN 1-56592-272-7
(est.).
(est.)
and ways
to translate that policy into
requirements. Windows
NT Backup & Restore
presents the reader with practical guidelines
up an
effective
backup system
both small and large environments.
Windows NT User
the native
NT
utilities
as well as major third-party hardware
It
in
covers
and
software.
at
creating users efficiently, controlling what they can do. limiting
Windows NT Server 4.
for
NetWare Administrators
they can cause, and monitoring their activities on
your system. Don't simply react to problems; use the techniques
book
to anticipate
Windows NT
and prevent them.
Server 4.0
on
Windows NT
1st Edition January 1998 464 pages, Indudes CD-ROM
SNMP
ISBN 1-56592-338-3
-,
B^*
^M
This
book describes
SNMP
^^^^\ ) \ *
book provides a
fast-track
means
(the Simple
their
for
to build
knowledge and master the funda-
mentals of using the Microsoft Windows Server.
of
the implementation of
Network Management
ly
NT
The broad coverage of many aspects
Windows NT
Server
is
balanced by a
tight-
focused approach of comparison, contrast, and differentiation
between NetWare and NT features and methodologies.
windows NT 3.51 and 4.0 look ahead to NT 50) and Win-
Protocol) on (
with a
dows 95
systems.
It
covers
SNMP and SNMP
Windows NT Desktop Reference
net-
By .Eleen
and detailed information on developing
management applications and extension
CD-ROM
756 pages. ISBN 1-56592-280-8
experienced NetWare administrators
By James D. Murray
''
By Robert Bruce Thompson 1st Edition November 1997
This
Windows NT SNMP
agents.
Frisch
1998 64 pages. ISBN 1-56592-437-1 1st Edition January
The book comes
containing a wealth of additional information:
standards documents, sample code from the book, and third-party,
as well
Kit,
By the author
1st Edition April
for setting
(like other O'Reilly ani-
Administration makes you an expert
with a
free third-party tools.
ery policy
Many Windows NT books introduce you
basics
utilities
Windows NT operating
Beginning with the need for a workable recov-
2 18 pages, ISBN 1-56592-301-4
work
covers the standard
Windows NT Backup & Restore
By Ashley J. MeggiitG Timothy 1st Edition November 1997
f\
It
of O'Reilly's bestselling book. Essential System Administration.
By
in this
man-
age Windows NT systems as productively
commercial and
Windows NT User Administration
damage
practical experience
,000-node cor-
porate network.
the
book combines
with technical expertise to help you
system and from the Resource
usage and
to the single-system
a
Fvhnuirx 1998 486 pages, ISBN 1-56592-274-3
offered with the
emphasis on networking.
to the administrator of
Frisch
1st Edition
WF^t
NT, creates a
an NT system
administrator (whether they realize
strategies for
Windows NT System Administration
Eric Pearce
SNMP-related software
tools, libraries,
A hip-pocket quick reference
many
commands,
and demos.
as well as the
from the Resource ingroups related
Kits.
O'REILLY 800-998-9938
•
[email protected]
•
http://www.oreilly.com/
Our products are available at a bookstore or software store near for information:
800-998-9938
•
707-829-0515
•
you.
[email protected]
Windows NT
Commands
to their
Covers Windows NT 4.0.
to order:
to
most useful commands are arranged
purpose and function.
System Administration Essential System Administration
^^
termcap
&
terminfo
Mui &
^ ^^^^ ^M ^L ^ ^^^S™
B) .tleen Fnsch
By John
2nd Edition
Tim
'^7~^~^w^^*~ System"
ma i° r
Administration
tion of Essential System Administration
grammers. This handbook provides informa-
provides a compact, manageable introduc-
tion
September 1995
Strang. Linda
O'Reilly
3rd Edition April 1988
788 pages. ISBN 1-56592-127-5
J
Thoroughly revised and updated for
270 pages. ISBN 0-937175-22-6
all
I
For UNIX system administrators and pro-
versions of UNIX, this second edi-
sible for a
on
writing
and debugging terminal
descriptions, as well as terminal initialization,
by everyone respon-
tion to the tasks faced
for the two
UNTX system. Whether you use a
UNTX terminal databases.
stand-alone UNIX system, routinely provide administrative support for a larger shared system, or just want an understanding of basic administrative functions, this
book
is
Managing NFS and NIS
for you. Offers
expanded sections on networking, electronic mail,
By Hal Stern and
security,
1st Edition June
kernel configuration.
1991
436 pages, ISBN 0-937175-75-7
Managing NFS and NIS is
System Performance Tuning By Mike Loukides 1st Edition November 1990
work
336 pages, ISBN 0-937175-60-9
site that
damental question:
How
can
I
uted database used to
to do more work without more hardware? Some performance
is
book devoted
entirely to these subjects, this guide is
solved sim-
Volume
you already have.
8:
X Window System Administrator's Guide By Linda Mui &
Eric Pearce
October 1992
372 pages. ISBN 0-937175-83-8
By Ed Ravin. Tim
O'Reilly.
Dale Dougherty
&
This
Grace Todino
book focuses on
& Managing UUCP describes,
works
UUCP
is
—
not just
trators, but for
in
one
popular communications and
transfer program.
anyone faced with the job
of administering
very attractive to
small machine, and a dial-up connection. This the latest versions of
HoneyDanBer
UUCP, and the specific implementation details of
UUCP
versions
shipped by major UNTX vendors.
O'REILLY" to order:
800-998-9938
•
[email protected]
•
http://www.oreilly.com/
Our products are available at a bookstore or software store hear for information:
800-998-9938
X
(including those run-
ning X on stand-alone workstations).
file
computer users with limited resources, a
book covers Taylor UUCP,
issues of system
X and X-based netfor UNTX system adminis-
administration for
1st Edition September 1996 424 pages. ISBN 1-56592-153-4
this
a
buy a bigger or
to
many can be
& Managing UUCP
volume,
any
a distrib-
"must-have" for anyone interested in UNIX networking.
Using
at
manage a network of computers. The only
1st Edition
^H ^k V^^V^
(Net-
has two or more UNTX systems. NIS
practical
better use of the resources
—±—
NTS
probably running
buying
problems do require you
Using
installation.
is
(Network Information System)
my UNTX-
get
Filesystem)
for system admin-
up or manage a
based computer
faster computer, but
making
to set
network filesystem
System Performance Tuning answers the fun-
ply by
who need
istrators
•
you.
707-829-0515 • [email protected]
:
How to stay in touch 1.
Visit
Our Award-Winning Web
Site
100
"fc'Top
5% Web
*"3-Star
Our web
site"
site
on
Sites
order® oreilly.com
— PC Magazine
—Web"
the
sites"
Contact Us via Email
4.
http://www. ore illy, com/
*"Top
To place a book or software order online. Good American and international customers.
Point Communications
—The McKinley
@
book excerpts and
periodicals.
[email protected]
tables of
General questions about any of our books.
contents), downloadable software, background articles, interviews with technology leaders, links to relevant sites,
book cover
art,
and more.
File
us in your
for North
subscriptions oreilly.com To place an order for any of our newsletters or
Group
contains a library of comprehensiveproduct
information (including
with O'Reilly
[email protected]
Bookmarks or
For general questions and product information about our software. Check out O'Reilly Software Online at
Hotlist!
http://software.oreilly.coin/ for software and technical
2.
Join Our Email Mailing Lists
support information. Registered O'Reilly software users
send your questions
New Product Releases
For answers
[email protected] first line
of your mes-
subscribe oreilly-news
problems regarding your order or our
you'd also like us to send information about trade
and other
show
or translation queries. For a
[email protected] first line
list
of our distributors
httpy/www.oreilly.com/www/order/country.html
subscribe oreilly-events
Get Examples from Our Books via
FTP
O'Reilly
There are two ways from our books:
to access
an archive of example
& Associates,
Inc.
101 Morris Street, Sebastopol, CA 95472 USA
files
TEL
707-829-05 1 5 or 800-998-9938
FAX
707-829-0104
(6am
Regular FTP •
to
5pm
PST)
ftp to:
ftp.oreilly.com (login:
anonymous
password: your email address) •
Point your
web browser
to:
ftp://ftp.oreiriy.coni/
FTPMAIL •
Send an email message to: [email protected] (Write "help" in the message body)
O'REILLY" to order:
our
outside of North America check out:
of your mes-
sage (not in the Subject field)
3.
to
[email protected] For information about our international distributors
O'Reilly events,
to:
Put the following information in the
corrections.
[email protected] To submit new book or software proposals editors and product managers.
O'Reilly Events
send email
to
[email protected] For book content technical questions or
sage (not in the Subject field):
events, special promotions,
[email protected]
products.
Put the following information in the
If
to:
[email protected]
To receive automatic email with brief descriptions of all new O'Reilly products as they are released, send email to:
800-998-9938
•
[email protected]
•
http://www.oreilly.com/
Our products are available at a bookstore or software store near for information:
800-998-9938
•
you.
707-829-0515 • [email protected]
from O'Reilly
Titles Please note that
upcoming
titles
are displayed in
WebProgramming Apache: The Definitive Guide Building Your
Own Web
Confer-
ences
Own
Web Review Studio Series
Distribution
Computer Crime: A Crimefight-
Gif Animation Studio
4.4BSD Svstem Manager's Manu-
Wide Web
DNS and BIND. 2nd 2nd
Ed.
The
Definitive Guide.
Linux Network Administrator's
Perl,
2nd
Networking Personal Computers
Security
UNIX
Practical
Programming with
Client
Using the Internet
Internet Securi-
mentary Documents File
X Programming
System Inter-
Privacy
& Catalog
Advanced Oracle PL/SQL Pro-
Vol.
gramming
Guide. Motif Edition
+M: X Toolkit Intrinsics Programming Manual. Motif Edi-
Checking C Programs with
DCE
System Performance Tuning
Distributing Applications Across
&
Using
The Whole Internet for Win 95
&
tion
lint
Vol. 5:
Programming
DCE & Windows NT
Volume
terminfo
Using Email Effectively
Web
Superhighway
Security
& Commerce
lex
Vol
Java
AWT
Learning VBScript
GNU Emacs. 2nd
Ed.
ence
Ed.
Learning the Korn Shell
Java in a Nutshell
tem
Edition
Linux
Java Threads
\i
Editor
Software
Running Linux. 2nd Ed.
WebSite™
SCO UNIX
1.1
Building Your
Own Web
sed Confer-
ences
Travel Travelers' Tales: Brazil Travelers' Tales:
Programming with GNU Software V Edi-
Pthreads Programming
Using csh
&
When You
2nd
Understanding
Writing
NetSuccess
GNU Emacs
Understanding Japanese InforTravelers' Tales:
UNLX Svstems Programming SVR4
NetTravel
Travelers' Tales: Spain for
Travelers' Tales: Thailand Travelers' Tales:
World
O'REILLY" 800-998-9938
•
[email protected]
•
http://www.oreilly.com/
Our products are available at a bookstore or software store near for information:
San Francisco
mation Processing
Extensions
Net Lessons
to order;
Mexico
DCE Travelers' Tales: Paris
Your UNIX
System Administrator
NetResearch
Women
Travelers' Tales: India
Ed. Travelers' Tales:
tsch
Can't Find
Food
Travelers' Tales: France Travelers' Tales: Gutsy
Software Portabilitv with imake.
Songune Guides
NetLearning
C++ Programming
Programming with curses
in a Nutshell: System
on CD-
ROM
Programming Python
UNLX Power Tools
Statisphere™
Law
Practical
a Nutshell
Electronic Publishing
Programming
tion
PolyForm™
Net
in
awk. 2nd Edition
Tcl/Tk Tools
UNIX
WebBoard™
NetActrvism
&
Practical C
Survival
Guide Love Your Job!
Power Programming with RPC
Linux Multimedia Guide
WebSite Professional™
The Computer User's
Real World
Making TeX Work
Java Virtual Machine
Business
Business
POSLX.4: Programming for the
in a Nutshell
&
Building a Successful Software
Porting UNLX Software
POSLX Programmer's Guide
Learning the
Java Network Programming
in a Nut-
shell
Career
Oracle PL/SQL Programming
Learning the UNIX Operating Sys-
Java Language Reference. 2nd
Release 6
Oracle Performance Tuning. 2nd
Learning the bash Shell
Guide
Programmer's Supplement for
The X Window Svstem
Guide Learning
X Window Svstem Admin-
X User Tools
Oracle Design: The Definitive
Reference
8
istrator's
Mastering Oracle Power Objects
Java Fundamental Classes Refer-
Reference Manual
Vol. 6C: Motif Tools
& yacc
Exploring Expect Exploring Java
Programming
Vol. 6B: Motif
Applica-
Managing Projects with make
UNIX
Java Series
DCE
tions
Administrator's Guide
Bandits on the Information
to Writing
Intrinsics Refer-
Manual
File
Formats, 2nd Ed.
Guide
X Window System
X Toolkit
ence Manual Vol. 6A: Motif
Encyclopedia of Graphics
Managing UUCP 8:
Reference Manual
3M: X Window System User's
Vol.
sendmail Desktop Reference
Security
Programming Manual
Xlib
Vol. 2: Xlib
sendmail. 2nd Ed.
termcap
1:
Programming
C++: The Core Language
TCP/IP Network Administration
The Whole Internet User's Guide
Protocol Reference
a Nutshell
Smileys
The Future Does Not Compute
X
Manual in
Applying RCS and SCCS
Good
PGP: Pretty
World Wide Web Journal
&
2nd Ed.
ty.
Perl
Manual
4.4BSD Programmer's Supple-
Vol.
with TCP/IP
& Commerce
File Sys-
Windows NT
Mastering Regular Expressions a Nutshell
Windows 95
Vol. 0:
WebMaster
Manual
User's Supplementary
Documents
nals
Managing NFS and NTS
in
Inside the
Windows NT
Services
Ed.
Registry-
Windows .Annoyances
Managing Internet Information
Programming
Windows 95
tem
Guide
Ed.
User's Reference
4.4BSD Programmer's Reference
Inside the
The Internet
56K and Up
at
4BSD
4.+BSD
Data Communications Terms Ed.
Getting Connected:
Learning Perl
Web Web
al -t
Windows
Essential Svstem Administration,
Web
Definitive Guide,
lavaScript:
Shockwave Studio
Dictionary of PC Hardware and
Designing for the
HTML: The 2nd Ed.
Handbook
Berkeley 4.4 Software
Computer Security Basics
Website
CGI Programming for the World
2nd
System Administration Building Internet Firewalls
er's
Building Your
italic.
800-998-9938
•
you.
707-829-0515 • [email protected]
A Woman's
International Distributors UK, Europe, Middle East and Northern Africa (except France, &
Germany, Switzerland,
Thomson
China Ron's DataCom Co
Kiyoshige Building 2F
"9 Dongwu Avenue
Austria)
inquiries International
Japan O'Reilly Japan. Inc.
Publishing Europe
12-Banchi. Sanei-cho
Dongxihu
Shinjuku-ku
Wuhan 430040
.
Ltd
District
Tokyo 160-0008 Japan
China
Berkshire House
Telephone: 81-3-3356-5227
Telephone: 86-2~-3892568
168- 1~3 HighHolborn
Fax:81-3-3356o2(-l
Fax:86-2"-3222108
London \VC1\ 7AA
Email: [email protected]
Email:
Telephone: 44-171497-1422
India
to 44-171497-1426
Computer Bookshop
All Other Asian Countries O'Reilly & .Associates, Inc.
hongfeng® public. wh.hb en
United Kingdom
Email: [email protected]
190
International
Thomson
Publishing Services,
Ltd
Cheriton House. North
W a\
Andover. Hampshire SP10 sBE
Sebastopol.
India
Telephone: 44-264-342-806 (outside UK)
Telephone: "0--829-0515
Fax:91-22-262-3551
Fax:
Email: [email protected]
Email: [email protected]
2~
Eire orders: [email protected]
D. 3rd Floor, Van's
W'oodsLane
Ltd.
"
Tower
Wong Chuk Hang Road
P.O.
Mona Vale NSW 2103 Australia
Telephone: 61-2-9970-5111
852-2580-6463
61-2-99*0-5002
New Zealand
Hanbit Media. Inc.
61 bd Saint-Germain
Sonyoung
Cedex 05
France
33-0144-41-1144
FRENCH LANGUAGE BOOKS All
Fax:
Korea
Editions Eyrolles
Fax:
countries except Canada
Bldg.
W oodslane New
202
Ltd.
21 Cooks Street (P.O. Box 575)
New Zealand
Kangnam-ku
Waganui.
Seoul. Korea
; Telephone: 64-6-34~-6 i45
Telephone: 822-554-9610
Fax:
64-6-345-4840
Email: [email protected]
822-556-0363
Emad: [email protected]
The Americas
Email: [email protected] English language
Zealand
Yeksam-dong "36-36
Fax:
Telephone: 33-01-44-41-46-16
books
Telephone: 33-01-44-41-1 1-S~ Email: distribution® eyrolles. com
Singapore, Malaysia,
McGraw-Hill Interamericana Editores.
And Thailand
S.A.
Addison Wesley Longman Singapore PTE
CedroNo. 512 Col.
Ltd.
Germany, Switzerland, and
2i
Austria
First
de
C.V.
Adampa 06450
Mexico.
Lok Yang Road
D.F.
Singapore 629~34
Telephone: 52-5-541-3155
INQUIRIES
Telephone: 65-268-2666
Fax:
O'Reilly Verlag
Fax:
Balthasarstr.
Email:
81
[email protected]
South Africa International
Germany
Philippines
Telephone: 49-221-9"-31-60-0
Mutual Books.
Fax 49-22 l-T-31-60-8
429-D Shaw Boulevard
Email: [email protected]
Mandaluyong
:
ORDERS International
52-5-541-4913
Email: [email protected]
65-268-023
D-506"0 Koln
Thomson Pubhshing
City.
Building 18. Constantia Park
138 Sixteenth Road
Metro
Box 2459
Manila. Phdippines
P.O.
Telephone: 632-"25-~538
Halfway House. 1685 South
Fax:
Telephone: 2"-l 1-805-4819
632-^21-3056
Fax 2"-l 1-805-3648
Email: [email protected]
5322" Bonn. Germany
Thomson Pubhshing
South Africa
Inc.
Kbnigswinterer Strafie -tl8
Telephone: 49-228-0-02-4 Fax:
NSW 2102
Box 935
Email: [email protected]
France
Paris
Pty. Ltd.
Place. W'arriewood
Telephone: 852-2580-3539
Email: [email protected]
"5240
Vuko
5
Aberdeen. Hong Kong
Fax:
International orders: [email protected]
"0--829-0104
Australia
Discount Subscription Service
I nit
Fax 44-264-364418 (UK)
44-264-342*61 (outside UK)
CA 954~2 USA
Telephone: 91-22-20"-0989
City
:
Telephone 44-264-342-832 (UK)
UK &
101 Morris Street
Road. Fort
Hong Kong
United Kingdom
Fax:
Dr. D.N.
Bombay 400 001
ORDERS
(India) PVT. Ltd.
49-228--H1342
Email: [email protected]
O'REILLY toordep:
800-998-9938
•
[email protected] • http://www.oreilly.com/
Our products are available at a bookstore or software store near for information
800-998-9938
•
707-829-0515
•
you.
[email protected]
.Africa
•r Ol
-
V5
S-
C —
—
>2
as
Where
this
card
r
— T UN
ir
OS
s
X _ ?
—
"3 o. -
S
2
o
3
X
3
WOULD LIKE TO HEAR FROM YOU
O'REILLY Which book did
x
u
— C/3
come from?
What
did you buy this book?
is
your job description? System Administrator
Programmer
Network Administrator
Educator/Teacher
Web
Bookstore
Computer Store
Direct from O'Reilly
Class/seminar
Developer
Other
Bundled with hardware/software Other
What operating system do you use? UNIX Macintosh Windows NT PC(Windows/DOS)
Please send
a complete
me
O'Reilly's catalog, containing
listing
of O'Reilly books and
software.
Other
Name
Company/Organization
\ddress
City
Telephone
State
Zip/Postal
Country
Code
Internet or other email address (specify network) 7
wood engraving & Associates Nutshell Handbook® Using & Managing UUCP Nineteenth century
PLACE
of a bear from the O'Reilly
STAMP HERE
NO POSTAGE NECESSARY IF MAILED IN THE UNITED STATES
BUSINESS REPLY MAIL FIRST CLASS MAIL Postage
will
PERMIT NO. 80
SEBASTOPOL, CA
be paid by addressee
O'Reilly
&
Associates, Inc.
101 Morris Street Sebastopol,
CA 95472-9902
II. I,
nl.
Lll.
II,
nl, till.
I,. I.
lull...
til. I.
.Nil
Networking
O'REILLY Virtual Private
Networks
Historically, only large
companies could afford secure networks, which they created
from expensive leased
lines.
Internet.
Nowadays, even
Smaller folks had to
companies have
large
because so many people telecommute or log
you provide The
solution
a low-cost, secure electronic
in
make do with go outside
to
the relatively untrusted
their private nets,
while they're on the road.
network
for
How
do
your organization?
a virtual private network: a collection of technologies that creates secure
is
connections or "tunnels" over regular Internet lines
anybody logging
in
from anywhere.
A number
—connections
of products
now
that
can be easily used by
exist to
help you develop that
solution.
This
book
tells
configuration,
with detailed
you how
to plan
and build
a
VPN.
It
starts
with general concerns like costs,
VPN fits in with other networking technologies like firewalls. It continues descriptions of how to install and use VPN technologies that are available for how
and
Windows NT and
a
Unix, such as
PPTP and L2TP.
the AltaVista Tunnel,
and the Cisco PEX.
Topics include:
How
the
VPN compares
to other available
Introduction to encryption, firewalls,
A
sample
VPN
networking technologies
and other technologies
that let
VPNs work
configuration
Point-to-Point Tunneling Protocol (PPTP)
The
AltaVista
Tunnel
The Cisco PEX
Firewall
Maintenance and troubleshooting
mo Visit O'Reilly
.95
ISBN 1-56592-31
on the
Web
at
www.oreilly.com
.95
RepKover.
,4^ 781565"9231V-
6
'"36920"92319 , '"o
Printed on Recycled Paper