Slide Keamanan Jaringan 06
Slide Keamanan Jaringan 06
Slide Keamanan Jaringan 06
RFC1918 Host ID
IP Address Range Netmask
Name Size
10.0.0.0 –
24-bit block 10.0.0.0/8 (255.0.0.0) 24 bit
10.255.255.255
172.16.0.0 – 172.16.0.0/12
20-bit block 20 bit
172.31.255.255 (255.240.0.0)
192.168.0.0 – 192.168.0.0/16
16-bit block 16 bit
192.168.255.255 (255.255.0.0)
Virtual Private Network Definition?
• A Virtual Private Network will protect the data you transfer over public WiFi.
Why do I need a VPN?
Confidentially
• such that even if the network traffic is sniffed at the packet level, an attacker would
see only encrypted data
Integrity
• message integrity to detect any instances of tampering with transmitted messages.
Authectication
• sender authentication to prevent unauthorized users from accessing the VPN
Types of VPNs
Site-to-Site VPN
• Connects the corporate office to branch offices over the Internet.
• Used when distance makes it impractical to have direct network connections between
these offices.
• Dedicated equipment is used to establish and maintain a connection.
Remote access
• A remote access VPN securely connects a device outside the corporate office.
• These devices are known as endpoints and may be laptops, tablets, or smartphones.
• Advances in VPN technology have allowed security checks to be conducted on endpoints
to make sure they meet a certain posture before connecting.
Hardware or Software VPN?
1. Compatibility
2. Scalability
3. Security
4. Cost
5. Vendor support
Virtual Private Network Technology
a) The information transmitted between the two locations via the encrypted
tunnel cannot be read by anyone else.
b) VPN security contains several elements to secure both the company's
private network and the outside network.
VPN Encryption
• Encryption works by having all data sent from one computer encrypted in
such a way that only the computer it is sending to can decrypt the data.
• Types of encryption commonly used include public-key encryption which is a
system that uses two keys — a public key known to everyone and a private
or secret key known only to the recipient of the message.
• The other commonly used encryption system is a Symmetric-key encryption
system in which the sender and receiver of a message share a single,
common key that is used to encrypt and decrypt the message.
VPN Equipment
• SSH is a datagram-based binary protocol that is capable of functioning on top of any Transport-layer that
can deliver a stream of binary data.
• It was originally designed as a replacement for the UNIX rlogin, rsh, and rep commands, in addition, it is
also used to provide secure X-Windows connections and secure forwarding of arbitrary TCP connections.
• SSH provides strong authentication and secure communications over tinsecure channels. All
communications are encrypted using IDEA or one of several other ciphers (e.g. triple-DES, DES, RC4-128,
Blowfish).
• Encryption keys are exchanged using RSA, and data used in the key exchange is destroyed every hour (keys
are never saved). Each host has an RSA key which is used to authenticate the host when RSA host
authentication is used.
• Encryption is used to protect against IP-spoofing; public-key authentication is used to protect against DNS
and route spoofing. RSA keys are also used to authenticate hosts.
• The datagram mechanism and related authentication, key exchange, encryption, and integrity mechanisms
implement a Transport layer security mechanism, which is then used to implement the secure connection
functionality.
Secure Socket Layer