Virtual Private Network
Virtual Private Network
Introduction
The Internet has grown in the last few years larger than anyone ever
imagined it could be. As it is now widely recognized that the Internet is the simplest way
of communication and data sharing, more and more companies rely on it for connecting
their offices worldwide.
Private Networks
Hybrid networks
Private Networks:
The Organization can use TCP/IP protocol for end-to-end communication between
stations at different sites. There is no need for IP address. The Organization can use any
IP class and assign network and host address internally.
Hybrid Networks:
The organization with 2 sites uses routers R1, R2 connect to the two sites privately
through a leased line. It uses the R3, R4 to connect two sites of the rest of the world.
The organization uses global IP address for both types of communication. Internet
packets are routed through R1, R2 and R3, R4 route the packets destined for outsiders.
Both private and Hybrid have a major drawback i.e. cost. Private networks
are expensive to connect several sites an organization needs several leased lines which
means a high monthly cost.
One solution is to use the global Internet for both the private and public
communication. A technology called Virtual private Network allows organizations to be
global internet for both purposes.
Now a day, more and more companies are creating their own virtual
private network to accommodate their needs. VPN, or virtual private network, is an
Internet service network that establishes a private connection over shared public
facilities. VPN acts as a bridge between two or more Local Area Networks (LANs)
across the Internet. VPN connections manage authentication between servers and
clients using data encryption. VPNs were created, so an access is permitted to
authorize users only. VPNs allow users to have access to the same network resources,
addresses, and so forth as if they were connected locally. VPNs provide a secure
service, because data is sent in an encrypted form between the client and the VPN
server - it makes harder to capture sensitive information, but not impossible.
Network VPN service lets clients open secure tunnels across the Internet
by connecting through a host's data center where the VPN equipmentand the staff to
service itactually resides. "Somebody who knows what they're doing picks the
equipment, manages it, and just tells you when there's a problem," says network
consultant Lisa Phifer, vice president of Core Competence in Chester Springs,
Pennsylvania. Because they're easier to deploy and maintain, managed VPNsand
network VPN service in particularare beginning to eclipse do-it-yourself solutions. In its
2000 WAN Manager Survey, IDC reported that companies are opting for VPN services
more often than in-house installations.
One reason for this recent upsurge in interest is that network VPN service
has changed the equation so radically. Until it debuted last year, only two managed
options were available, and both were pricey. Customer premises equipment (CPE)
programs, in which an outside provider installs, maintains, and trouble- shoots
equipment on a company's own premises, require service contracts that cover the cost
of troubleshooting on-site. Internet Protocol (IP) over frame relay is a high-end service
provided by carriers in which tunnels are opened through central data centers where the
equipment is hosted and maintained.
To build a VPN, a company buys a special hardware and software system
for each of its sites. The system is placed between the companys private (i.e. internal)
network and public network. Each of the systems must be configured with the address of
the companys other VPN systems. The software will then exchange packets only with
the VPN systems at the companys other sites. Furthermore to guarantee, privacy VPN
encrypts each packet before transmission.
In addition to configuring, the VPN system at each site, a network
manager must also configure routing at the site. Whenever a computer at one site sends
a packet to a computer to another, the packet is routed to the local VPN system. The
VPN system examines the destination and encrypts the packet and sends the result
across the public network to the VPN system at the destination site when a packet
arrives , the receiving VPN system verifies that it came from a valid peer, decrypts the
contents and forward the packet to its destination.
The point is:
The VPN combines the advantages of private and public networks by
allowing a company with multiple sites to have the illusion of a completely private
network and to use a public network to carry traffic between sites
Anchor Pharmacies' search for a manageable, low-cost way to link its stores
together led it to network VPN service, one of the hottest twists on VPN connectivity. The
company's expansion strategy was to acquire financially strapped independent
drugstores and restore their profitability by cutting costs through the efficiencies of
central management. But secure connectivityor the lack of itwas standing in the way
of Anchor's plans.
Hardware-based systems
Firewall-based systems
However, as the VPN market continues to rapidly evolve, the lines between
different VPN architectures are increasingly blurred; many hardware vendors have
included software clients to their product offerings, and extended their server
Capabilities to include the security features found in software-based or firewall-based
VPNs. Similarly, some standalone products have added support for hardware-Based
encryptions to boost their performance. Companies providing managed VPN services
will usually bundle other value-added services to their secure global connectivity such as
consulting, design and support for emerging applications, such as voice over IP,
Companies and other global services use one of the following VPN types:
Site-to-Site VPN
Site-to-site (STS) based VPN is a private network utilizing the Internet.
This type of application provides levels of security, privacy and manageability that are
similar to networks based upon private leased lines (see above). Site-to-Site VPN can
be either:
10
VPN Security
In the beginning of the article I have written that VPN provides a
secure environment for a company. In this section I'll discuss three major methods to
secure the connection.
Authentication
Authorization
Accounting
AAA Server
11
Encryption
Tunneling
Encryption
Encryption has the major role when creating a secure connection. Tunneling
creates the network, encryption makes it secure - scrambles data so that only those who
have the right key can decode it. Most of the computer systems use either Symmetrickey encryption or Public-key encryption (for more details see below).
12
Internet. Since the Internet doesn't speak the same language as your network does, a
tunnel packages the data you're sending so that the Internet can understand it.
IPSec
IPSec, or Internet Protocol Security, provides IP network-layer encryption.
The common technique to encrypt and authenticate VPN is IP Security. IPSec provides
two operation modes - transport and tunnel. In transport mode, only the IP payload is
encrypted, and IP headers are left intact. This mode doesn't provide defense against
spoofing attack or network analysis. An attacker can pass the IP header in the clear, so
the transport mode allows him to perform an attack. In tunnel mode, the entire datagram
is encrypted. IPSec uses a mechanism called Encapsulation Security Payload (ESP) to
implement encryption. IPSec uses an authentication header to implement authentication.
Design Issues
Some of the design issues considered in case of Virtual Private Networks:
IP fragmentation support
strength of security
firewall inter-operability
13
scalability
export restrictions
cost
Software solutions
The software solutions might be better termed "software approximations."
The classic solution is to provide privacy on an application-by-application basis using
crypto APIs. Secure remote access is provided by encrypted telnet services like SRP or
SSH. SSH also permits tunneling other services (like X) over the encrypted connection.
For dial-in connections, Blaze's Encrypting Session Manager (ESM) provides encryption
after the session has been established. Encrypted voice communication over the
Internet is provided by Nautilus or PGPfone. Transport layer encryption for TCP is
provided by SSL, also see the IETF's Transport Layer Security (TLS) drafts. More
integrated software solutions can be provided by Kerberos or OSF's DCE or by using a
Point to Point Tunneling Protocol (PPTP or Microsoft's PPTP implementation and a FAQ)
and vulnerabilities. L2TP combines the best of PPTP and Cisco's L2F protocol.
Blaze's swIPe, or vpnd, and CIPE provide encrypted transport services; also see Gong's
enclave paper. The on-going development of IP security options for IPv4 and IPv6 along
with ISAKMP and GKMP may soon provide the necessary software tools for constructing
your own virtual private network, and there are some implementations available for
testing, also see paper on MS-DOS implementation. Also, see the recent Internet draft,
or the VPN framework, or the S/WAN initiative and Linux free swan or or OpenVPN
NIST's Cerberus.
14
AltaVista client tunnel, and DSN's Net Fortress. Here are some preliminary performance
data of encrypted tunneling throughput and latency.
Further Information
VPN Papers from Technology Guides
http://www.itpapers.com/resources/tech_guides.html
Super resource on VPNs
http://vpn.shmoo.com/
VPN Design (Cisco)
http://www.cisco.com/warp/public/779/largeent/design/vpn.html
VPN FAQs
(Cisco)http://www.cisco.com/univercd/cc/td/doc/product/rtrmgmt/cw2000/vpnmon/1_x/10
/using /vpnmimp.htm
Terms used in VPNs
http://www.vpnc.org/terms.html
what about VPN Security?
http://www.findvpn.com/articles/secure.cfm
IP Security Protocol (IPSec)
http://www.ietf.org/html.charters/ipsec-charter.html
Wireless VPN Solution
http://www.mobileinfo.com/ProductCatalog/Columbitech_VPN.htm
Symmetric-Key Encryption
http://dsa-isis.jrc.it/Trinidad/Infra/Trini_SymKey.html
Public-Key Encryption
http://www.ebcvg.com/download.php?id=1028
15
16