Network Security
Virtual Private Network (VPN)
Amir Ali
[Link]@[Link]
Outline
Virtual Private Network (VPN)
Internet Protocol Security (IPSec)
Virtual Private
Network (VPN)
Private Network
Hybrid Network
Virtual Private
Network (VPN)
VPN provides the same connectivity and
privacy as that of a private network on the
public network as two networks are physically
apart but virtually on the same network
Virtual Private
Network (VPN)
A VPN is a means of carrying private traffic
over a public network.
Often used to connect two private
networks, over a public network, to form a
virtual network
The word virtual means that, to the users
on either end, the two private networks
seem to be seamlessly connected to each
other.
That is, they are part of a single virtual
private network (although physically they
are two separate networks).
The word ‘private’ means VPN should
A Typical VPN
Setup
Tunneling
Most VPNs rely on tunneling to create a
private network that reaches across the
Internet
Tunneling is the process of placing an
entire packet within another packet and
sending it over a network.
The protocol of the outer packet is
understood by the network and both
points, called tunnel interfaces, where the
packet enters and exits the network
Tunneling:
Protocols
Tunneling requires three different
protocols:
Passenger protocol - The original data (IPX,
NetBeui, IP) being carried
Encapsulating protocol - The protocol
(GRE, IPSec, L2F, PPTP, L2TP) that is
wrapped around the original data
Carrier protocol - The protocol used by the
network
Tunneling
Internet Protocol
Security (IPSec)
IP Security
Internet Protocol Security (IPSec) is a
protocol suite for securing Internet
Protocol (IP) communications by
authenticating and encrypting each IP
packet of a communication session.
Application of
IPSec
IPSec can provide secure communication
across a LAN, across private and public
WANs and across Internet.
Secure branch office connectivity over
the Internet
Secure remote access over the Internet
Establishing extranet and intranet
connectivity with partners
Enhancing electronic commerce security
A typical scenario
of IPSec usage
IPSec Modes
Transport Mode
Tunnel Mode
IPSec Transport
Mode
IPSec Tunnel Mode
IPSec Protocols
Authentication Header (AH)
Encapsulation Security Payload (ESP)
IPSec Protocols:
Authentication
Header (AH)
Provides data integrity and authentication
of IP packets
The data integrity ensures undetected
modification of IP packets in transit is not
possible
The authentication part ensures
authentication of the source (application
or user)
Authentication is based on the use of a
message authentication code (MAC)
Guards against spoofing attack
IPSec Protocols:
Encapsulation Security
Payload (ESP)
Provides message content
confidentiality & limited traffic flow
confidentiality
Can optionally provide the same
authentication services as AH
Supports range of ciphers, modes,
padding
Including DES, Triple-DES, etc
CBC & other modes
padding needed to fill block-size, fields,
for traffic flow
ESP or AH?
The ESP Protocol was designed after
the AH Protocol was already in use. ESP
does whatever AH does with additional
functionality (privacy)
The question is, Why do we need AH?
The answer is, we don’t. However, the
implementation of AH is already
included in some commercial products,
which means that AH will remain part
of the Internet until the products are
phased out.