Secure Communication
Virtual Private Networks (VPN)
A Virtual Private Network (VPN) creates a secure connection that encrypts private data over a public network, most commonly the internet.
A VPN is often managed with a device called a VPN concentrator, which serves as the endpoint for user connections.
VPN concentrators can be integrated into hardware-based firewalls or exist as standalone appliances; they can also be implemented as software solutions.
VPN Implementation and Use
Client workstation software often enables connection and authentication to the VPN concentrator; this software may be integrated into the operating system.
Diagram A: Encrypted Connection using VPN
Remote User: Located outside of a corporate network.
VPN Concentrator: Facilitates secure connection between external and internal networks.
Corporate Network Resources: Available once securely connected.
The Red Section: Represents the encrypted tunnel where all remote user traffic to the VPN concentrator is encrypted, ensuring privacy during transmission.
Security: If traffic is intercepted during transmission, the content remains unreadable due to encryption.
Decryption: The VPN concentrator decrypts this traffic, allowing it to be sent in clear text into the corporate network.
Data Encryption and Transmission in VPNs
Data being sent through a VPN must include an IP header that indicates the intended recipient; this header is not encrypted. Hence, data and headers need to be handled carefully to ensure security.
Concept of Tunneling:
When original IP header and data are encrypted, additional IPsec headers and trailers are added to allow routing to the VPN concentrator.
Diagram B: Packet Structure
Original IP header and data are encrypted and wrapped in an IPsec header and trailer.
A new IP header is added to provide routing information to routers.
Decryption Process: Upon reaching the IPsec concentrator, the headers are removed, and original information is decrypted to continue on its path.
Types of VPNs
SSL/TLS VPNs:
Secure Sockets Layer (SSL) and Transport Layer Security (TLS) are protocols used for encrypting web communication over TCP port 443.
SSL VPNs are commonly used for remote access from individual devices, often requiring clients to log in using typical credentials.
Options for Credentials: Users can opt for standard usernames/passwords, digital certificates, or shared passwords.
Browser Integration: Some SSL VPN clients can function within a browser, eliminating the need for additional software installation.
Always-On Configuration: Some implementations ensure an automatic connection to VPN upon device startup, maintaining ongoing secure communication.
Site-to-Site VPNs:
Used to establish secure communication between remote locations without needing additional software at both ends.
Often facilitated by firewalls functioning as VPN concentrators.
Software-Defined Wide Area Networks (SD-WAN)
Definition: SD-WAN stands for Software-Defined Networking in a Wide Area Network, developed to resolve challenges in connecting to cloud-based services.
Evolution of Networking: Initially, data centers were centralized within organizational buildings. Moving forward, service access transitioned to cloud-based environments.
Traditional Network Design:
Organizations historically had a centralized data center with web services, email, and databases accessible via dedicated connections from remote sites.
Transitioning to Cloud: Databases and applications have migrated to cloud environments, creating complexities in network architecture due to the necessity of routing communications efficiently.
SD-WAN Benefits:
Optimizes connections to web-based applications, ensuring users at remote sites can efficiently access necessary services.
Integration of Secure VPN Technologies with SD-WAN
SASE (Secure Access Service Edge):
Represents the next generation of VPN technologies designed to make communication more efficient with web-based applications by locating security services alongside cloud applications.
Implementation: SASE clients are installed on devices to facilitate secure communication into cloud services.
Target Users: Corporate offices, home users, and mobile workers can securely connect to cloud infrastructures.
Communication Methods and Implementation Considerations
Organizations may utilize multiple secure communication solutions:
Remote access VPNs (SSL VPNs) for user communications.
IPsec site-to-site VPNs for inter-office connections.
SD-WAN for seamless connections to cloud-based applications.
SASE for securing the data traveling over SD-WAN.
Advantages and Disadvantages: Each technology has its pros and cons, and security administrators must evaluate which combination offers the best protection while meeting organizational needs.