chapter 5
chapter 5
Institute of Technology
Department of Electrical and Computer Engineering
(communication Engineering)
5th year Second semester
Switching and Intelligent Networks
By: Ahmed A. (MSc.)
Chapter 5
Virtual Private Network (VPN)
Outline
Introduction to VPN
The Internet Security (IPsec)
Secure Socket Layer (SSL)
What is a
VPN?
A virtual private network, or VPN, is an encrypted connection over the Internet
from a device to a network.
The encrypted connection helps ensure that sensitive data is safely transmitted.
It prevents unauthorized people from eavesdropping on the traffic and allows
the user to conduct work remotely.
VPN technology is widely used in corporate environments.
An employee can work outside the office and still securely connect to the
corporate network.
Even smartphones and tablets can connect through a VPN.
Cont……
A virtual private network (VPN) is a technology that creates a safe and encrypted
connection over a less secure network, such as the internet.
A Virtual Private Network is a way to extend a private network using a public
network such as the internet. The user can be part of a local network sitting at a
remote location.
Virtual Private Networks are defined broadly as a way to extend a private
network through the public network such as the Internet (Brown, 1999). A private
network is a network that exists in a Local Area Network (LAN).
Cont…..
• VPN is a generic term used to describe a communication network
that uses any combination of technologies to secure a connection
tunneled through an otherwise unsecured or untrusted network
Instead of using a dedicated connection, such as leased line (fig a),
a "virtual" connection is made between geographically dispersed
users and networks over a shared or public network, like the
Internet (fig b)
Cont…..
• Site-to-site VPNs are used when distance makes it impractical to have direct
network connections between these offices.
• and integrity
• Used in transport mode (host-to-host), or tunnel mode
(gateway-to-gateway).
IPsec Security Association
(SA)
Unidirectional logic connection between two Ipsec systems.
Each SA has associated different security services.
• Next Header: the actual “protocol” field in the IP header that was replaced with IPsec.
• Payload Length: length of AH (in counts of 32-bits)
• Security parameters index: connection identifier, indicates the connection that this packet
belongs to.
Each connection has its own key. Therefore the receiver knows, from this identifier,
which key to use.
• Sequence number: used not for ordering (like TCP) but to prevent replay
attacks!
IPsec ESP
• Used for authentication, integrity and confidentiality.
• ESP header has fields similar to the AH header, plus some more for encryption purposes.
• HMAC is a trailer (rather than a header) due to easier hardware implementation (like
Ethernet’s CRC).
• provides to the IPsec parties the symmetric keys used for packet
authentication and/or encryption.
SSL (Secure Sockets Layer)
• SSL is a transport layer protocol that use TCP port 443
• An SSL VPN allows users to connect to VPN devices using a web browser.
• The SSL (Secure Sockets Layer) protocol or TLS (Transport Layer Security) protocol is
used to encrypt traffic between the web browser and the SSL VPN device.
• One advantage of using SSL VPNs is ease of use, because all standard web browsers
support the SSL protocol, therefore users do not need to do any software installation or
configuration
Modes of Operation
• Each security protocol supports two modes of operation
Tunnel mode (End to End)
• It encrypts and/or authenticates the header and the data of each packet