VPN Lecture
VPN Lecture
CYB306
What is VPN?
Establishes a secure connection over an insecure network, such as
the Internet.
Enables an organization to use Public Networks such as the
Internet, to provide a Secure connection among the organization’s
wide area network
Great alternative to private WAN connections since Internet access
is usually cheaper and it’s widely available.
Using the Internet as a backbone, a VPN can securely connect all of
a companies offices, telecommuters, mobile workers, customers,
partners and suppliers.
VPN Features
Confidentiality: preventing anyone from reading your data. This is
implemented with encryption.
Authentication: verifying that the router/firewall or remote user
that is sending VPN traffic is a legitimate device or router.
Access Control: restricting unauthorized users form the network.
Integrity: verifying that the VPN packet wasn’t changed somehow
during transit.
Anti-replay: preventing someone from capturing traffic and re-
sending it, trying to appear as a legitimate device/user.
VPN Types
Site-to-site VPN: Network devices at each site, between these two
network devices can build a VPN tunnel. Each end of the VPN
tunnel will encrypt the original IP packet, adds a VPN header, a new
IP header and then forwards the encrypted packet to the other end
of the tunnel.
Client-to-site VPN: Also called remote user VPN. The user installs a
VPN client on his/her computer, laptop, smartphone or tablet. The
VPN tunnel is established between the user’s device and the remote
network device.
VPN Gateway and Tunnels
A VPN gateway is a network device that provides encryption and
authentication service to a multitude of hosts that connect to it.
From the outside (Internet), all
communications addressed to
inside hosts flow through the
gateway.
VPN Protocols - IPsec
The IP protocol itself doesn’t have any security features at all, which is
why IPSec was created. IPSec is not a protocol but it’s a framework and
offers VPN features on layer three of the OSI model (Network Layer).
It uses a variety of protocols such as encryption algorithms like DES,
3DES or AES but if a new algorithm is created, IPSec could use it in the
future.
You can use IPSec for:
When the VPN client wishes to communicate with company server, it prepares
a packet addressed to 192.168.1.10, encrypts it and encapsulates it in an IPSec
packet
VPN Tunnel Example
VPN Tunnel Example
This packet is then sent to the VPN server at IP address 5.6.7.8 over the
public Internet
The inner packet is encrypted so that even if someone intercepts the
packet over the Internet, they cannot get any information from it
They can see that the remote host is communicating with a VPN
server, but none of the contents of the communication.
The inner encrypted packet has source address 192.168.1.50 and
destination address 192.168.1.10.
The outer packet has source address 1.2.3.4 and destination address
5.6.7.8
VPN Tunnel Example
When the packet reaches the VPN server from the Internet, the VPN
server: