What is Virtual Private Networks
A private network that is created via tunneling over a public network, usually the Internet.
Benefits of Virtual Private Networks
VPN services
Architecture Classifications
i. Intranet VPN
* LAN-to-LAN connection (site to site)
* Connects Branch Offices to Main Office
* Fixed Tunnel End Points
ii. Extranet VPN
* LAN-to-LAN connection (site to site)
* Connects Trading Partners to Main Office
* Fixed Tunnel End Points
iii. Remote VPN
* User-to-LAN connection
* Connects Remote Mobile Users to Main Office
* Variable IP Addresses on Tunnel End Points
* A.k.a. Virtual Private Dial-up Network (VPDN)
Tunnelling Taxonomy
Classification - Voluntary Tunnels
i. End-to-end tunnels
ii. Created at the request of a client computer, which acts as the tunnel end point
iii. A separate tunnel is created for each communicating pair
iv. Eg. Dial-up connection
Tunnelling Taxonomy
Classification - Compulsory Tunnels
i. Intermediate devices act as tunnel end points
ii. Created and configured by an intermediate device
iii. Compulsory tunnels are shared by multiple
communications
iv. Intermediate device named differently in different tunnelling protocols e.g. Intermediate device is
called IP Security Gateway in IPSec,
Tunnelling Protocols on Difference OSI layers (mcq)
What are the 2 Site to Site VPNs
Generic Routing Encapsulation (GRE)
Generic Routing Encapsulation (GRE) statement
(ref image)
R1(config)# interface tunnel 0
R1(config–if)# ip address 10.1.1.1
255.255.255.252
R1(config–if)# tunnel source serial 0/0
R1(config–if)# tunnel destination
209.165.200.225
R1(config–if)# tunnel mode gre ip
What is IPsec - Internet Protocol
Security
What are the 2 IPsec Framework Protocols
Authentication Header (AH)
What does Authentication Header (AH) NOT provide
Confidentiality (encryption).
* It is appropriate to use when confidentiality is not required or permitted.
* All text is transported unencrypted.
* It only ensures the origin of the data and verifies that the data has not been modified during transit.(integrity assured)
* If the AH protocol is used alone, it provides weak protection.
Encapsulating Security Payload (ESP)
Port of Encapsulating Security Payload (ESP)
protocol number 50
Port of Authentication Header (AH)
protocol number 51
Transport Mode
What does Transport Mode work well with
Tunnel Mode