Network Architecture: Virtualization, Cloud Computing, and Security
Network Architecture
October 11, 2024
Objectives
- Describe and explain virtualization technologies, including how virtual machines connect with a network and how networking infrastructure devices can be virtualized.
- Describe cloud computing categories and models, and discuss concerns regarding cloud connectivity and security.
- Secure network connections using encryption protocols.
- Configure remote access connections between devices.
Virtualization
Virtualization Definition | Host |
|
|
Guest | Hypervisor |
|
|
Type 1 Hypervisor | Type 2 Hypervisor |
|
|
Customize the VMs | Elements of Virtualization |
|
Advantages: Efficient use of resources, cost and energy savings, fault and threat isolation, simple backups, recovery, and replication.
Disadvantages: Compromised performance, increased complexity, increased licensing costs, single point of failure.
Network Connection Types
1 VM = 1 vNIC (virtual NIC) | VM’s vNIC is selected |
Every VM has its own vNIC (virtual NIC):
|
|
1 VM = Several vNICs | 1 Host = Multiple vSwitches |
Each VM can have several vNICs.
|
|
Host-Only Mode | |
| |
Images | |
Cloud Computing
Flexible provision of data storage, applications, and services to multiple clients over a network.
Features | vDesktops, Server Info |
|
|
Characteristics | 4 Categories |
Cloud computing service models are categorized by the types of services provided:
|
Cloud Computing Service Models
Deployment Models
Cloud services are delivered in a variety of deployment models.
Public Cloud | Private Cloud |
|
|
Community Cloud | Hybrid Cloud |
|
|
Encryption Protocols
Use mathematical code, called a cipher, to scramble data into a format that can only be read by reversing the cipher.
- Used to keep information private.
- Primarily evaluated by three benchmarks (CIA Triad = principles of standard security model):
- Confidentiality.
- Integrity.
- Availability.
Key:
- Random string of characters.
- Woven into original data’s bits.
- Generates unique data block called ciphertext.
- Created according to a specific set of rules (algorithms).
Key encryption can be separated into two categories:
- Private key encryption.
- Public key encryption.
Key pair = Combination of public and private keys.
Asymmetric encryption = Requires two different keys.
Digital certificate = Holds identification information and the user’s public key.
CA (certificate authority) = Issues, maintains digital certificates.
PKI (Public Key Infrastructure) = Use of certificate authorities to associate public keys with certain users.
Private Key Encryption | Public Key Encryption |
|
|
IPsec (Internet Protocol Security)
Encryption protocol suite that defines rules for encryption, authentication, and key management for TCP/IP transmissions.
5-Step IPsec Secure Connection
IPsec initiation.
Key management.
Security negotiations.
Data transfer.
Termination.
SSL and TLS (Secure Sockets Layer and Transport Layer Security)
- Both are methods of encrypting TCP/IP transmissions, including Web pages and data entered into Web forms.
- Both protocols work side by side and are widely known as SSL/TLS or TLS/SSL.
- When a client and server establish a SSL/TLS connection, they establish a unique session.
- Association between client and server.
- Defined by agreement.
- Specific set of encryption techniques.
- Created by SSL handshake protocol.
- Handshake protocol.
- Allows client and server to authenticate.
- Similar to a TCP three-way handshake.
Remote Access
Service that allows a client to connect with and log on to a server, LAN, or WAN in a different geographical location. Requires a type of RAS (remote access server).
2 types of RAS:
- Dedicated devices.
- Software running on a server.
Types of remote access:
- Point-to-point over a dedicated line.
- A Data Link layer protocol; Directly connects 2 WAN endpoints.
- Negotiate and establish a connection between two computers.
- Use an authentication protocol to authenticate a client to a remote system.
- Terminal emulation.
- Also called remote virtual computing.
- Allows a user on 1 computer to control another computer across a network connection.
- Examples of command-line software:
- Telnet
- A terminal emulation utility that allows an administrator or other user to control a computer remotely.
- Provides little security for establishing a connection (poor authentication).
- Provides no security for transmitting data (no encryption).
- SSH (secure shell)
- A collection of protocols that provides for secure authentication and encryption.
- Guards against a number of security threats:
- Unauthorized access to a host.
- IP spoofing.
- Interception of data in transit.
- DNS spoofing.
- Developed by SSH Communications Security: Version requires a license fee.
- Open source versions available: Open SSH.
- Secure connection requires SSH running on both client and server.
- Allows for password authentication using public and private key generation.
- Configuration options:
- Use 1 of several encryption types.
- Require client password.
- Perform port forwarding: Redirect traffic that would normally use an insecure port to a SSH-secured port.
- Examples of GUI-based software:
- Remote Desktop for Windows.
- join.me
- VNC.
- Team Viewer.
- Examples of GUI-based software:
- Virtual private network (VPN).
VPNs (Virtual Private Networks)
A VPN is a network connection encrypted from end to end that creates a private connection to a remote network, sometimes referred to as a tunnel.
VPNs can be classified according to 3 models:
- Site-to-site VPN.
- Client-to-site VPN.
- Also called host-to-site VPN or remote-access VPN.
- Host-to-host VPN.
A router-based VPN is the most common implementation on UNIX-based networks.
- Server-based VPNs are most often found on Windows networks.
VPN concentrator:
- Authenticates VPN clients.
- Establishes tunnels for VPN connections.
- Manages encryption for VPN transmissions.
2 primary encryption techniques used by VPNs:
- IPsec.
- SSL.
VPN Tunneling Protocols
To ensure VPNs can carry all types of data securely. Special VPN protocols encapsulate higher-layer protocols in a process known as tunneling.
- Many VPN tunneling protocols operate at the Data Link layer.
- Encapsulate the VPN frame into a Network layer packet.
- Some VPN tunneling protocols work at Layer 3.
- Enables additional features and options.
- PPTP (Point-to-Point Tunneling Protocol).
- A Data Link layer protocol that directly connects two WAN endpoints.
- PPP can:
- Negotiate and establish a connection between two computers.
- Use an authentication protocol to authenticate a client to a remote system.
- L2TP (Layer 2 Tunneling Protocol).
- GRE (Generic Routing Encapsulation).
- Open VPN.
- IKEv2.
CARP (Common Address Redundancy Protocol), which allows a pool of computers or interfaces to share one or more IP addresses. This pool is known as a group of redundancy or redundancy group. When using CARP, one device, acting as the group master, receives requests for an IP address, then parcels out the requests to one of several devices in the group.
In-Class Friday
October 11, 2024. There is no lab this week. Will introduce the group projects over reading week.