Title: Global InternetIntranet Access Service
1Learning to Live and Work with Virtual Private
Networks
CEENET 6 Budapest Hungary
2Tunneling Defined
- Creating a transparent virtual network link
between two network nodes that is unaffected by
physical network links and devices.
3Tunneling Explained
- Tunneling is encapsulating one protocol in
another - Tunnels provide routable transport for unroutable
packets - encrypted, illegal addressing, non-supported
- Tunneling itself provides no security
4Tunneling Illustrated
5Tunneling Illustrated
6Tunneling Illustrated
LAN B
LAN A
7Tunneling Illustrated
Step 2
Original IP
packet
encapsulated
in another IP
packet
Original IP
New IP
packet
Packet
Workstation
Router A
Router B
Y
Original IP
packet dest Y
Tunnel
Tunnel
Workstation
Step 1.
Step 3
X
Original, unroutable
Original packet extracted, sent to destination
Original IP
packet dest Y
IP Packet sent to router
8Virtual Private Networks (VPN)
- What is a VPN?
- A means of augmenting a shared network on a
secure basis through encryption and/or tunneling - Tunnels created between endpoints for
transporting data securely across public
networks - Benefits
- Leverages existing Service Provider
infrastructure for private data communications - Cost savings
9What Is an IP VPN ?
- Emulate a private network over a shared IP
network ..
Branch Offices
Remote Workers
Shared IP Network
Internet
Corporate Headquarters
Customers, Suppliers
- Why IP ?
- Service Differentiation, Global Connectivity,
Flexibility, Platform for fast growing new
services (e.g E Commerce)
10Types of IP VPN Services
- Service options
- Applications Dial, Intranet, Extranet
- QoS End to end guarantees, service
differentiation, best effort - Security Network based, user based
- Infrastructure Internet, IP, ATM, MPLS
11One way to communicate
Tokyo
Remote Access Server
Internet
LAN
Web Sites
New York HQ
Firewall
Router
CSU/DSU
CSU/DSU
PSTN (Dial) or Dedicated Line
LAN
London
Router
CSU/DSU
Firewall
CSU/DSU
Router
LAN
Firewall
Remote Access Server
12Another view of network possibilities... A
Virtual Private Network
Tokyo
Firewall
LAN
Web Sites
New York
Router w/L2TP
CSU/DSU
Firewall
Internet
LAN
London
Router w/L2TP
CSU/DSU
CSU/DSU
LAN
Router w/L2TP
Remote Clients
13Internet as Backbone Dial-Up
Internet/ISP Network
Secure Tunnel
VPN Gateway
Remote User with VPN Software
Private Network
Hacker
14Internet as Backbone Branch Offices
Internet/ISP Network
Branch Office
VPN Gateway
Secure Tunnel
VPN Router
Private Network
15Shared Dial Networking
Shared Service Provider Network
Mobile Employee
IAG
VPN Gateway
Telecommuter
IAG
Contractor
Tunneled Traffic
IAG
Private Network
16Virtual Private Networks
Extends private network boundary across a shared
network using tunneling technology
Virtual Private Dial-Up
IAG
Private Servers
Tunnels
VPN Gateway
VPN Gateway
Virtual Private Dial-Up
Shared Network
Internal Users
17Types of Tunnels
- Two basic types of tunnels
- Voluntary tunnels
- Tunneling initiated by the end-user(Requires
client software on remote computer) - Compulsory tunnels
- Tunnel is created by NAS or router(Tunneling
support required on NAS or Router)
18Voluntary Tunnels
- Will work with any network device
- Tunneling transparent to leaf and intermediate
devices - But user must have a tunneling client compatible
with tunnel server - PPTP, L2TP, L2F, IPSEC, IP-IP, etc.
- Simultaneous access to Intranet (via tunnel) and
Internet possible - Employees can use personal accounts for corporate
access - Remote office applications
- Dial-up VPNs for low traffic volumes
19A Voluntary PPTP Tunnel
20Compulsory Tunnels
- Will work with any client
- But NAS must support same tunnel method
- But Tunneling transparent to intermediate
routers - Network access controlled by tunnel server
- User traffic can only travel through tunnel
- Internet access possible
- Must be by pre-defined facilities
- Greater control
- Can be monitored
21Compulsory Tunnels
- Static Tunnels
- All calls from a given NAS/Router tunneled to a
given server - Realm-based tunnels
- Each tunnel based on information in NAI(I.e.
user_at_realm) - User-based tunnels
- Calls tunneled based on userID data stored in
authentication system
22A Compulsory L2TP Tunnel
23RADIUS Support for Tunnels
- Can define tunnel type
- Can define/limit tunnel end points
- Allows tunnel configuration to be based on
Calling-Station-ID or Called-Station-ID - Additional accounting information
- Tunnel end points
- Tunnel ID, etc.
24RADIUS Dial Up Security
Authenticates dial in users at boundary of
private network
Private Network
RADIUS Server
RADIUS Protocol
Boundary
RAS
User Login
Remote User
Hacker
25Protocol Comparison
PPTP L2TP IPSEC Authenticated Tunnels
X X Compression X X X Smart
Cards X X Address Allocation X
X Multiprotocol X X Strong
Encryption X Flow
Control X Requires Server X
X
26Virtual Private Networks via the Layer Two
Tunneling Protocol (L2TP)
27L2TP Building Blocks
- L2TP Access Concentrator (LAC)
- Typically attached to the switched network
fabric, such as public switched telephone network
(PSTN) - Only needs to implement the media, over which
L2TP operates in order to pass traffic to one or
more LNS's - Typically the initiator of incoming calls and the
receiver of outgoing calls
28L2TP Building Blocks (Cont-)
- L2TP Network Server (LNS)
- Operates on any platform capable of PPP
termination - Handles the server side of the L2TP protocol
- scalability is critical
- Able to terminate calls arriving at any LAC's
full range of PPP interfaces (async, ISDN, PPP
over ATM, PPP over Frame Relay) - The initiator of outgoing calls
- The receiver of incoming calls
29L2TP VPN in the Network
Customer Premise Equipment
Service Provider
Remote, Telecommuter Employees
LNS
LAC
Corporate Network/ Servers
ISDN
Analog
RADIUS
RADIUS
L2TP Encapsulated Tunnel
30How Does a L2TP VPN Device Work?
- Service provider provides remote access
outsourcing services to utilize idle network
infrastructure and provide their customers with
the cost savings of using a public network like
the Internet - The customer wants to connect their remote branch
offices and telecommuters to Corporate HQ servers
31How Does a L2TP VPN Device Work?
- STEP 1
- Remote users/telecommuters/branch offices
initiate a session or call into a L2TP Access
Concentrator (LAC) device
STEP 1
Service Provider
CPE
LAC
Remote, Telecommuter Employees
LNS
Corporate Network/ Servers
ISDN
Analog
RADIUS
RADIUS
32How Does a L2TP VPN Device Work?
- STEP 2
- The LAC sends an authentication request to a
RADIUS Server, which will authenticate the call
and generate configuration information about the
creation, type of L2TP tunnel and end point of
the tunnel
Service Provider
CPE
Remote, Telecommuter Employees
LAC
LNS
Corporate Network/ Servers
ISDN
Analog
STEP 2
RADIUS
RADIUS
33How Does a L2TP VPN Device Work?
- STEP 3
- Tunnel creation information is sent to the LAC
which encapsulates the users PPP Frames and
tunnels them over the network to the LNS device.
Service Provider
STEP 3
CPE
Remote, Telecommuter Employees
LAC
LNS
Corporate Network/ Servers
ISDN
Analog
RADIUS
RADIUS
34How Does a L2TP VPN Device Work?
- STEP 4
- LNS serves as termination point where the
encapsulated L2TP frame is stripped and
processed. The PPP Frame is then passed on to
higher layer protocols and users on the local
area network.
STEP 4
Service Provider
CPE
LAC
Remote, Telecommuter Employees
LNS
Corporate Network/ Servers
ISDN
Analog
RADIUS
RADIUS
35- VPN Questions and Answers
- (FAQs)
36Q What is a virtual private network?
- A VPN gives users a secure way to access or link
corporate network resources over the Internet or
other public or private networks.
37Q What are the elements to a VPN?
- VPNs typically include a number of security
features including encryption, authentication,
and tunneling. - VPN software may be included on laptops and
network workstations and servers or may be
included with routers and remote access servers
38Q How do companies use VPNs?
- I place of traditional dial-up connections to
provide access to remote users and telecommuters - To connect LANs in different sites instead of
using the public switched telephone network or
dedicated leased lines - To give customers, clients and consultants access
to corporate resources.
39Q Is a VPN the same thing as an extranet?
- No. Most VPNs can be designed to work as an
extranet. But not all extranets are VPNs.
40Q Then what is an extranet?
- Extranet is a general term than can mean many
different things. The common definition of an
extranet is a type of network that gives outside
users, such as customers, clients and
consultants, access to data residing on a
corporation's network. Users access the data
through a Web brows er over the Internet and
typically need to enter a user name and password
before access to the data is granted.
41Q How is this different from a VPN?
- A VPN can be used in a similar manner, but
typically a VPN has much higher security
associated with it. Specifically, a VPN typically
requires the establishment of a tunnel into the
corporate network and the encryption of data
passed between the user's PC and corporate
servers.
42Q Why bother with a VPN, aren't there other ways
to give users secure access to network resources?
- There are different ways to control access and
provide secure access to network resources. A VPN
is just one of those ways. - However, a well implemented VPN is transparent to
the user and should require no special skills or
knowledge to use
43Q What are other methods for accessing network
resources over the Internet?
- Depending on the level of security needed, a
company could choose to use an extranet approach
or a customized approach that combines password
protection of network servers with third-party
auth entication systems.
44Q Why do companies use VPNs?
- There are many reasons to use a VPN. The most
common reasons are (1) to save
telecommunications costs by using the Internet to
carry traffic (rather than paying long distance
phone charges)(2) to save telecommunications
costs by reducing the number of access lines into
a corporate site, and (3) to save operational
costs by outsourcing the management of remote
access equipment to a service provider.
45Q How does a VPN cut long distance phone
charges?
- Long distance phone charges are reduced with a
VPN because a user typically dials a local call
to an ISP rather than placing a long distance or
international call directly to his or her
company.
46Q How do VPNs help reduce the number of access
lines.
- Many companies pay monthly charges for two types
access lines (1) high-speed links for their
Internet access(2) frame relay, ISDN Primary
Rate Interface or T1 lines to carry data . A VPN
may allow a company to carry the data traffic
over its Internet access lines, thus reducing the
need for some installed lines.
47Q How can a VPN save operational costs?
- Some companies hope to save operational costs by
outsourcing their remote access to an ISP or
other type of service provider. The idea is that
by giving users access to the network via a VPN,
a company can get rid of its modem pools and
remote access servers. The operational cost
savings come from not having to manage those
devices.
48Performance Issues
49Q What about VPN performance?
- There are several issues to consider when
exploring VPN performance. Some are related to
the Internet itself. Is it available? What is the
latency for packets traveling across the network?
Other performance issues are related to the
specific VPN applications. - In general, VPNs implemented over the public
Internet will have poorer performance than VPNs
implemented over private IP networks.
50Q What are the concerns about network
availability?
- The Internet occasionally experiences outages.
For example, in 1997 there was a system-wide
availability problem when a corrupted master list
of Domain Names was distributed to the handful of
root servers that are the heart of the Internet.
More frequently, a particular Internet service
provider may experience equipment problems
leading to a service outage that can last from
hours to days.
51Q What can be done to ease concerns about
network availability?
- Many service providers are trying to improve the
reliability of their networks to prevent outages.
While they cannot guarantee 100 percent
availability, many providers are offering service
level agreements that offer credits or refunds if
network availability falls below a certain level.
52Q How good are the network availability service
level agreements (SLAs)?
- Most of the service providers with nation-wide
backbones guarantee the network will be available
at least 99.6 percent of the time. That
translates into a maximum outage time of about 6
.5 minutes a day before the refund or credits
kick in. Some offer higher availability with
refunds or credits kicking in for outages of 3
minutes per day or longer.
53Q What are the short-comings of these SLAs?
- All VPN SLAs offered today only apply to the
specific service provider's network. If the
traffic crosses from one provider's network to
another, the SLAs do not apply.
54Q What about latency?
- To date, there are no VPN SLAs that address
latency. The service providers say they will need
a number of things, like the ability to offer
quality of service guarantees, to happen before
latency SLAs will be offered.
55Q Are there other issues that will prevent
latency-related VPN SLAs?
- Yes. IT managers will not see end-to-end latency
SLAs for VPNs as they get for other services such
as a Frame Relay service that carriers
time-sensitive SNA terminal to host traffic. One
of the reasons end-to-end latency SLAs will not
be practical for VPN s is that there are many
variables, such as the type of encryption used
and the client's process power, that determine
end-to-end performance in VPN applications.
56VPN Technology Questions
57Q What are the common tunneling protocols?
- There are currently three major tunneling
protocols for VPNs. They are - Point-to-Point Tunneling Protocol (PPTP)
- Internet Protocol Security (IPSec)
- Layer 2 Tunneling Protocol (L2TP)
- Two proprietary protocols often seen are
- Ascends ATMP
- Ciscos L2F
58Q What types of encryption can be used in VPN
applications.
- Virtually all of the common encryption
technologies can be used in a VPN. Most VPN
equipment vendors give the user a choice. IT
managers can often select anything from the
40-bit built-in encryption offered by Microsoft
under Windows 95 to more robust, but less
exportable, encryption technologies like
triple-DES.
59Q How are VPN users authenticated?
- VPN vendors support a number of different
authentication methods. Many vendors now support
a wide range of authentication techniques and
products including such services as RADIUS,
Kerberos, token cards, NDS, NT Domain, and
software and hardware-based dynamic passwords.
60Q Can user access and authentication be linked
to existing access control systems?
- Yes. Some vendors, such as Lucent, support
existing standards like RADIUS. - Other VPN vendors, notably Aventail, Novell, and
New Oak Communications, provide ways to link VPN
access rights to defined access rights such as
those in Windows NT Workgroup lists, Novell
Directory Services or Binderies.
61Net 10.x.1.0
Net 10.x.2.0
Net 10.x.2.0
LAC
Telnet Server 10.x.2.5
Workstation 10.x.2.128
Terminal Server 10.x.1.2
LNS
10.x.1.1
10.x.2.1
Router
RADIUS Server 10.x.2.3
This RADIUS server is used to select the LNS
based on the DNIS, Realm or other information
This RADIUS server is used to authenticate the
user
L2TP Tunnel Lab Diagram
62Net 10.x.2.0
Net 10.x.1.0
Net 10.x.2.0
LAC
L2TP Tunnel Lab Diagram