Lecture 5a - Virtual Private Networks
Lecture 5a - Virtual Private Networks
1
What is a VPN?
Definition
Virtual Private Network is a type of private network that
uses public telecommunications, such as the Internet,
instead of leased lines to communicate ,by creating a
dedicated link of communication.
2
Brief Overview of How it Works
• Two connections – one is made to the Internet and
the second is made to the VPN.
• Datagram – contains data, destination and source
information.
• Firewalls – VPNs allow authorized users to pass
through the firewalls.
• Protocols – protocols create the VPN tunnels e.g.
3
Typical VPN Connection
4
VPN Major Characteristics
• Must emulate a point-to-point link
*Achieved by encapsulating the data that
would allow it to travel across the Internet to
reach the end point
• Must emulate a private link
*Achieved by encrypting the data in the data
packets
5
Four Security Functions
6
Basic VPN Requirements
a) User Authentication
• VPN must be able to verify user authentication
and allow only authorized users to access the
network.
b) Address Management
• Assign addresses to clients and ensures that
private addresses are kept private on the VPN
c) Data Encryption
• Encryption -- is a method of “scrambling” data
before transmitting it onto the Internet.
• Public Key Encryption Technique is used
• Digital signature – for authentication
7
Basic VPN Requirements contd …
d) Key Management
• Keys must be generated and refreshed for
encryption at the VPN server and the client
• Note that keys are required for encryption
e) Multi-protocol Support
• The VPN technology must support common
protocols on the Internet such as IP, IPX etc
8
Industries that typically use VPNs
VPN generally provides users with connection to the corporate network
regardless of their location
a) Remote-Access VPN
11
a) Remote-Access VPN
• Remote-access, also called a Virtual Private Dial-up
Network (VPDN), is a user-to-LAN connection used by
a company that has employees who need to connect to
the private network from various remote locations.
13
b) Site-to-Site VPN
i) Intranet-based - If a company has one or more
remote locations that they wish to join in a single
private network, they can create an intranet VPN to
connect LAN to LAN. E.g. CABS 4th Street Branch and
CABS 1st Street Branch in Harare.
ii) Extranet-based - When a company has a close
relationship with another company (for example, a
partner, supplier or customer), they can build an
extranet VPN that connects LAN to LAN, and that
allows the various companies to work in a shared
environment. E.g. Volsec and SAZ( Security
Association Zimbabwe) connect via VPN to share
security personnel background information.
14
Site-to-Site VPN
15
Tunneling
• Tunneling is the process of placing an entire
packet within another packet and sending it over
a network.
• Tunneling involves the encapsulation,
transmission and de-capsulation of data packets
• The data is encapsulated with additional headers
• The additional headers provide routing
information for encapsulated data to be routed
between the end points of a tunnel
16
Tunneling
17
Types of tunneling
a)Point-to-Point Tunneling Protocol (PPTP)
• Encapsulate and encrypt the data to be sent over a corporate or
public IP network
b) Level 2 Tunneling Protocol (L2TP)
• Encrypted and encapsulated to be sent over a communication link
that supports user datagram mode of transmission
• Examples of links include X.25, Frame Relay and ATM
c) IPSec Tunnel Mode
• Encapsulate and encrypt in an IP header for transmission over an IP
network
d) Layer 3 Tunneling Protocol
• IPSec Tunneling Mode
• Encapsulates the payload in an additional IP header
18
Windows Implementation of VPN
19
VPN Service Providers in Zim
VPN Protocols
• There are three main protocols that power the
majority of VPNs:
• PPTP
• L2TP
• IPsec
• All three protocols emphasize:
i. encryption and authentication
ii. preserving data integrity that may be
sensitive; and
iii. allowing clients/servers to establish an
identity on the network
21
VPN Protocols (contd…)
a) Point-to-point tunneling protocol (PPTP)
• PPTP is widely supported by Microsoft as it is built into the
various flavours of the Windows OS
• The PPTP protocol specification does not describe
encryption and authentication, it simply tunnels the traffic.
• PPTP has weak security features
22
VPN Protocols (contd…)
c) Internet Protocol Security protocol (IPSec)
• It provides enhanced security features such as better
encryption algorithms and more comprehensive
authentication.
• IPSec has two encryption modes: tunnel and transport.
Tunnel encrypts the header and the payload of each
packet while transport only encrypts the payload.
• Only systems that are IPSec compliant can take
advantage of this protocol.
• IPSec can encrypt data between various devices, such as:
• Router to router
• Firewall to router
• PC to router
• PC to server
23
VPN Tunneling
25
VPN Packet Transmission
b) Scalability
• Flexibility of growth
• Efficiency with broadband technology
28
Private network Vs VPN Charges
29
Disadvantages
• VPNs require an in-depth understanding of public
network security issues and proper deployment of
precautions
• Immature standards
30
VPN Challenges
• Connecting to a VPN takes several steps, and the user
needs to wait for authentication.
• For organizations that check the status of a computer
before allowing the connection, establishing a VPN
connection can take several minutes.
• Solution-Users should make sure that their computers
are up-to-date with the latest security protocols before
attempting to initiate sessions to save on time.
• Internet performance is slowed if both intranet and
Internet traffic go through the VPN connection.
• Solution-Split tunneling should be considered as an
option. Restrict communication via VPN to only when
necessary, otherwise connect directly to the internet.
31
VPN Best Practices
a) Use a firewall
b) Secure the base operating system
c) Use a single ISP
• Minimize routing hops and insure cooperation
d) Use packet filtering to reject unknown hosts
e) Use public-key encryption and secure authentication
f) Compress before you encrypt
• Stream compression will help overall performance
g) Secure remote hosts
32
Summary
• A virtual private network (VPN) is a network that uses
public means of transmission (Internet) as its WAN
link, connecting clients who are geographically
separated through secure tunneling methods
• Main VPN protocols include PPTP, L2TP, and IPsec
• VPN Tunneling supports two types: voluntary
tunneling and compulsory tunneling
• Cost and Scalability are the main advantages of a VPN
• Network security and Internet stability are the main
concerns for VPN’s
33