High Availability for IPsec VPN Platforms: ClusterIP Evaluation
|
|
|
- Vivian Barrett
- 9 years ago
- Views:
Transcription
1 High Availability for IPsec VPN Platforms: ClusterIP Evaluation Daniel Palomares, Daniel Migault, Wolfgang Velasquez, Maryline Laurent To cite this version: Daniel Palomares, Daniel Migault, Wolfgang Velasquez, Maryline Laurent. High Availability for IPsec VPN Platforms: ClusterIP Evaluation. th International Conference on Availability, Reliability and Security (ARES 0), Sep 0, Regensburg, Germany. pp., 0. <hal- 00> HAL Id: hal-00 Submitted on Sep 0 HAL is a multi-disciplinary open access archive for the deposit and dissemination of scientific research documents, whether they are published or not. The documents may come from teaching and research institutions in France or abroad, or from public or private research centers. L archive ouverte pluridisciplinaire HAL, est destinée au dépôt et à la diffusion de documents scientifiques de niveau recherche, publiés ou non, émanant des établissements d enseignement et de recherche français ou étrangers, des laboratoires publics ou privés.
2 High Availability for IPsec VPN Platforms: ClusterIP Evaluation Daniel Palomares, Daniel Migault, Wolfgang Velasquez, Maryline Laurent France Telecom, Institut Télécom, Télécom SudParis, CNRS Samovar UMR, Abstract To manage the huge demand on traffic, the Internet Service Providers (ISP) are offloading its mobile data from Radio Access Networks (RAN) to Wireless Access Networks (WLAN). While these RANs are considered trusted networks, WLANs need to build a similar trusted zone in order to offer the same security level and Quality of Service (QoS) to End- Users (EU). Although IPsec is widely implemented to create trusted environments through untrusted networks, the industry is increasingly interested in providing IPsec-based services with High Availability (HA) features in order to ensure reliability, QoS and security. Even though IPsec is not originally well suited to provide HA features, some mechanisms like VRRP or ClusterIP can work together with IPsec in order to offer HA capabilities. ClusterIP is actually used by strongswan (an open source IPsecbased VPN solution) to build a cluster of IPsec Security Gateways (SG) offering HA features. This paper concentrates on how to build a cluster of IPsec SGs based on ClusterIP. We describe the main issues to overcome HA within IPsec. Then, we measure how HA may affect the EU experience, and provide recommendations on how to deploy ClusterIP. Finally, our tests over an HTTP connection showed that ClusterIP allows fast recovering during a failure. Index Terms IPsec Clustering, ClusterIP, Security Gateway Handover, Fast IPsec recovering I. INTRODUCTION Nowadays, mobile operators are facing the exponential growth of mobile data. Among different solutions, a short term alternative consists in switching mobile data from Radio Access Networks (RAN) to WLAN network. For example, the iwlan [] architecture proposes to carry the IP data between the End-User (EU) and the operator s core network through a WiFi access. Once the EU is transferred to the WiFi access, it establishes an IPsec connection with a dedicated Security Gateway (SG) that gives access to some services or simply to the Internet. Furthermore, this IPsec session should maintain the QoS prior to offload and the SG must remain available and reliable to EUs. The industry is increasingly interested in providing services with High Availability (HA) capacities. The HA clusters aim to increase the availability of a service. In terms of IPsec, an HA IPsec cluster increases the IPsec service s availability. For example, when an IPsec tunnel is established towards a given SG within a cluster, the IPsec parameters could be spread among its cluster members. In the event of a failure during an IPsec session, some other SGs must ensure the VPN service. Actually, the availability and the continuity of service are guaranteed by different mechanisms. It is important to distinguish a mobility event from an IPsec context transfer due to a failover. Mobility means that an EU changes the IP address of the tunnel but the IPsec parameters of the communication remains in the same nodes. On the other hand, a failover mechanism requires a new SG to go on with an existing VPN session and the IPsec parameters must be set.thus, all these parameters should be transferred towards another SG, and the affected EUs attaches the new SG. Throughout this article, we concentrate on the methods that ensure IPsec availability as well as the continuity of an IPsec service. This mainly involves the transfer of a tunnel between different SGs. We also evaluate how an EU is affected when this happens. The scenario we consider is an EU that wishes to reach an HTTP server placed within a trusted network protected by a SG. The EU first establishes a VPN towards a SG in the trusted network. Hence, the SG authenticates and protects the traffic between the EU and the HTTP server. We use strongswan [] to establish these tunnels. In order to provide HA capacities, we use ClusterIP, allowing to build a cluster of SGs that share a common IP address without having a physical machine to perform this task. Thus, each SG determines from the incoming packets whether it is responsible for it or not. Our testbed consists in a cluster of two SGs configured with a common IP address. When a EU establishes a VPN towards the cluster, one of the SGs is considered the active SG, whereas the other member is considered the passive (also known as stand-by SG). The active SG is the one that takes responsibility of the tunnel, whereas the passive SG is waiting to become the newly active SG if a failure occurs to the active SG. Both SGs synchronize all their IPsec tunnels so that they keep track of every single tunnel established with any EU. Our experiments are mainly focused in causing a failure to the active SG during a VPN session and evaluating the High Availability performances of the platform. At this point, the passive SG (not affected by the failure) detects no activity through the Synch Channel between them and consequently applies a new ClusterIP policy and becomes the newly active SG for a given IPsec tunnel. This ensures availability of the VPN services and avoids renegotiation from scratch of each tunnel of concerned EUs.
3 This paper considers a HA solution for IPsec using strongswan. First, section II positions our work and related subjects. Then, section III describes the challenge to overcome VPN counters synchronization during an IPsec context transfer. Following section IV explains how to set up the platform with ClusterIP. Section V explains how strongswan implements ClusterIP in order to create IPsec SG clusters. Section VI shows the experiments performed as well as the results obtained. And section VII gives our conclusions. II. POSITION OF OUR WORK & RELATED WORK Concerning High Availability within IPsec, there exist similar works and approaches: - Yu [] proposes to solve availability issues on IPsec by simulating a cluster mechanism for IPsec gateways. As far as we know, this is the only paper that addresses similar issues. Its seamless switching mechanism aims to spread SAs among both active and passive SGs. The author does not recommend a High-Reliable link between SGs in order to communicate the SAs, but the article mentions that the members of the cluster could be deployed in different network segments. The seamless switching process consists of adding a notify payload during the IKE AUTH exchange in order to establish two tunnels (one VPN towards the active SG and a second stand-by VPN towards the passive SG of the cluster). The passive SG receives the IPsec information from the responsible active SG and installs a passive VPN towards the EU. Finally, there is also a mechanism of seamless switching to transparently change from the active-to-passive SG and to synchronize ESP replay sequence number. On the other hand, the case of a heavily loaded SG is not considered. The results are based on simulations and not in real implementation. By contrast, our ClusterIP-based mechanism do not need additional IKEv payloads, so it is transparent for EUs. - RFC: The Virtual Router Redundancy Protocol (VRRP) [] aims to solve the failure of a single SG in a network. It adds redundancy to the network by creating a group of SGs with a common virtual IP address. This is similar to our mechanism based on ClusterIP. As such, those routers which belong to the same VRRP group will use the same virtual IP. Every interface that is configured with VRRP owns a virtual IP address that is common to all routers being part of the redundant topology. In the case where two or more routers are configured with VRRP, the responsibility is determined with the parameter vrrp-priority. It defines which router has the biggest priority in order to take responsibility as a SG among all the group. The goal is to create a default SG with a unique IP address so that any host accesing through one of the SGs, does not know how many routers are composing the group. The responsible SG acting as default SG is called master virtual router, whereas all the other routers are called backup virtual routers, which are ready to get the role of master virtual router and forward packets if the master virtual router fails. Note that VRRP does not aim to perform load-balancing as it does not distribute the load of VPNs among different routers, but it adds fault tolerance (redundancy) to the network. By contrast, ClusterIP is able to identify IPsec traffic and spread the load among different SGs. This permits VPN distribution among different SGs within a cluster. Additionally, the existing Open Source implementation of ClusterIP on strongswan, supports hot-standby clustering between different SGs during an active VPN session. For all these reasons, ClusterIP was selected instead of VRRp over IPsec. - RFC: Protocol Support for High Availability of IKEv/IPsec []. This RFC proposes an extension to the IKEv protocol. It aims to solve the refreshing of both IKEv (IKE SA) and IPsec (CHILD SA or IPsec SA) counters due to a mismatch caused by a failure takeover process. The scenario addressed in the document is oriented to solve hot-standby IPsec-Clusters failures. A hot-standby IPsec-Cluster consists of a group of IPsec SGs in which there is only one member active at a time. All the IKEv/IPsec contexts are distributed among all the members of the cluster. When a failure occurs on the active SG during an IPsec/IKEv communication, the End-User (EU) continues sending IKEv/IPsec traffic towards the cluster, leading to unsynchronized counters and packets loss. In order to reestablish the synchronization of counters, the new SG sends an IKEv message request of type INFORMATIONAL in order to negotiate counters. Concerning our work, this protocol solves the main troubles of synchronization of both IKEv messages (IKE SAs) and IPsec counters (CHILD SAs). Although it involves changes to the IKEv protocol, this extension handles the renegotiation of the IKEv/IPsec counters in an efficient manner and should be considered if any IPsec/IKEv counters mis-synchronization occurs. III. IPSEC/IKEV AND HIGH AVAILABILITY CONSTRAINTS IKEv and IPsec were primarily designed for static configurations. IPsec/IKEv states has accordingly been designed to remain installed in the same device during a session or VPN Tunnel establishment. However, todays requirements demand facilities to profit from mobility, handover, offload or even VPN session migration between SGs. This situation leads often to new extensions. For example: MOBIKE extension for mobility [], MOBIKE-X draft for mobility and multihoming [] [] [9], CXTP and mechanisms to transfer security contexts [0] [] [] or a High Availability protocol to synchronize counters []. The huge demand on mobile data have increased the demand on system s availability. This is the goal of ClusterIP. Clustering a VPN service at the network layer level (e.g. IPsec) seems to have positive impact when dealing with reliability of IPsec-based communications. Because IPsec imposes a strict
4 Fig.. (a) Stale Messages ID values (b) Stale Sequence Number value IKE/IPsec counters desynchronization check of its counters, the main issue is to synchronize both SG s IPsec parameters and counters. When an EU establishes an IPsec protected communication with a server, it first needs to configure how to protect the communication with the SG. The protocol used to negotiate the security parameters of the communication is IKEv. Further exchanges allow to agree on a secure channel that serves to negotiate the IPsec parameters (to actually protect the IP traffic). IKEv and IPsec are different protocols with their own counters. The message ID counters provide anti-replay protection and keep track of every IKEv exchange, whereas the sequence numbers provide anti-replay protection and strict control of IPsec traffic. Even though the amounts of IKE messages do not represent as much traffic as the IPsec traffic, the synchronization of messages ID is critical due to the very strict control of the IKE SAs when setting up a VPN tunnel and a very narrow window size. A. IKEv/IPsec Counter Synchronization The IKEv/IPsec suite aims to protect IP traffic. However, IKEv and IPsec act at different layers. IKEv is an application layer protocol which queries and responds to port 00 and 00 in order to negotiate a secure channel between two endpoints sharing an IKE Security Association (IKE SA). On the other hand, IPsec is a protocol that takes place at the IP layer and protects the traffic according to IPsec Security Associations (IPsec SAs) policies, which are previously negotiated through the IKE SA secure channel. All IKEv exchanges consist of a request-response pair of messages. It is mandatory to retransmit a request until it has been acknowledged. The IKEv window mechanism allows to send some IKEv requests without receiving a response, but once the window s limit is achieved, the oldest request must be acknowledged resulting in a window increase by one. This window is managed through the IKEv counters called: Message ID. Each IKEv message header includes its corresponding message ID, so that IKEv can strictly control the window as well as all unacknowledged messages. When the message ID is n and the window size is w, only IKEv messages between n + < Message ID < n + w can be processed. If no acknowledgment is received after a long period of time, then the IKE SA is deleted. Figure a shows an example of the mis-synchronization during IKEv exchanges between two endpoints with a window size w =. Challenges concerning IKEv when implementing cluster of IKEv/IPsec SGs are: Stale Value of Message ID: when takeover takes place, it is possible that the newly active SG is not aware of the last IKEv response made by the previously active SG. If this happens when taking responsibility, then the message ID used by the new responsible SG will be stalled. Figure a illustrates this case. Unacknowledged Request: when a passive SG takes responsibility during a fail-over, it may happen that it is unaware of the last request sent, and thus the counter is stale. Receiving an unexpected message ID response would result in discarding the packet. This leads to IKE SA destruction. The anti-replay parameter of the IPsec Security Association is called sequence number counter. When the Anti-Replay service is enabled, it controls every incomming/outgoing IP packet protected with IPsec. Note that IPsec allows a sender to skip forward by sending a higher sequence number. Remember also that a duplicated usage of a sequence number is forbidden. Thus, when the sequence number counter is n and the window size is w, any message with sequence number < n w + will be discarded. A big window size (E.g. 0) means that a node is capable to handle a bigger range of packets that arrive out of order. On the other hand,when sequence number = n and the window size is very little (E.g. w = ), the node is capable to remember only the last sequence number. The following packet must have a value sequence number > n, otherwise the packet is dropped. The biggest challenge concerning IPsec when implementing cluster of IKEv/IPsec SGs is: Stale Sequence Number value: when a passive SG takes responsibility and becomes the newly active SG, it may happen that the sequence numbers are out of date. Figure refesp illustrate this situation. This occurs when the newly active SG starts sending IPsec protected packets with staled sequence numbers, implying that the EU rejects all the duplicated packets due to anti-replay
5 protection of IPsec. Instead, note that IPsec allows to increase these sequence numbers without preventing the EUs, and the communication would not be interrupted. There are three ways to avoid sequence number values. First, in the case that the newly active SG keeps an IPsec session from another SG, it may send an IKEv message to the EU in order to update both the Message ID and the sequence number value. However, this solution requires to create a new notify payload and thus to modify the IKEv protocol itself. Indeed, [] proposes this method of resynchronization. The second approach is a client unaware method. It consists in creating a cluster of IPsec SGs which maintain synchronized Message ID values as well as sequence number values. These latter can be synchronized by implementing ClusterIP (see section refsec:clusterip). The third approach concerns the sequence number values only. When a newly active SG takes responsibility of a tunnel, it may skip a big number of sequence number values and the IPsec session will still not be interrupted. Note that the IPsec protocol allows both endpoints to skip some sequence number values without prior agreement. IV. CLUSTERING METHODS FOR IPSEC This section positions Load-Balancing facing High Availability, details how takeover may impact the client and finally describes ClusterIP configuration and operation with IPsec. A. Load-Balancing Versus High-Availability Clusters A Load-balancing cluster is a set of nodes where more than one of the members may be active at the same time. Loadbalanced clusters are implemented by sharing the workload between cluster nodes and offering better performance. HAclusters operate by having redundant nodes intended to provide a service when other node fails. For Linux, the latter has been implemented using a free software package developed by the Linux-HA project, having the heartbeat software as the main product. Heartbeat automatically monitors resources so that they can be restarted or moved to another node on failure. B. ClusterIP Implementation When using a ClusterIP approach, no special hardware is required to benefit from Load-Balancing. Indeed, ClusterIP is intended to provide load-balancing features without having a load-balancer. The configured members of the cluster does share a multicast MAC address and thus receive the same packets. Then, a lower-layer mechanism (netfilter code) on each node, filters packets by calculating responsibility through an algorithm (E.g hashing the IP source of each packet). When applied, ClusterIP acts as a parameter for the iptables command. The nodes in a cluster usually have two Network Interface Cards (NIC). One of the NICs MAC address is replaced by the shared cluster MAC address and then a common virtual IP address is mapped onto it. The other NIC, being completely independent, can be used for any other purpose, as for example inter-nodes communications (E.g. Hearbeat mechanism). Given the case where a machine counts with only one NIC, it is also possible to install a second virtual IP address on the same interface. ) ClusterIP & IPsec : Originally, ClusterIP does NOT handle IPsec traffic. In fact, a given IPsec communication is associated to counters, and thus must be treated by a single s. Two SGs cannot handle a given IPsec communication unless the two SGs share a common IPsec context for the same communication. However, if an IKE daemon (E.g. strongswan) handles to synchronize IKE SAs and IPsec SAs states, a modified version of ClusterIP that handles IPsec traffic could solve synchronization troubles; but the overhead for synchronizing ESP sequence numbers could be very high. Thus, deploying IKEv and IPsec in a cluster requires the synchronization of a large amount of information among all the cluster members. On the other hand, if less information is synchronized, fail-over would take longer to perform. As stated in III-A, synchronizing counters might be the major barrier to overcome when it comes to setting up a cluster with IPsec. Some states involved in an IKEv/IPsec session establishment are long lasting: IKE Security Associations: a SG may establish hundreds or thousands of IKE SAs. Also, they may live for several minutes, hours, or days. They contain keys, selectors and other information concerning IKE traffic. IPsec Security Associations: a SG may establish hundreds or thousands of IPsec SAs. Also, they may live for several minutes, hours, or days. They contain keys, selectors and other information concerning IPsec traffic. Security Policy Database SPD: they may live as long as an IKE SA but they also tend to live longer in some operative systems. IKE Counters (Message ID Counters) are the longest living states but at the same time are required to synchronize less often since synchronization might only occur whenever an IKE SA is created or some INFORMATIONAL or REKEY exchange occurs. However, IKE needs to update the Message ID Counter immediately, as processing a message having a higher ID is not allowed (see III-A). This is achieved by synchronizing IKE message counters after every single IKE exchange. Concerning the anti-replay counters, every ESP/AH protected packet carries a sequence number that cannot be reused since the anti-replay feature would consider it as an attack, leading to drop all the packets and issuing attack warnings. Synchronizing anti-replay IPsec counters is not reasonable neither, due to the high load introduced (for each packet emitted). As a result, the designed solution synchronizes the counters every n-th packets (0.000 packets). This choice is justified since skipping sequence numbers is allowed in IPsec, and highly reliable delivery service (as in IKEv) is not provided.
6 V. STRONGSWAN S HA PLUGIN StrongSwan is a complete OpenSource IPsec-based VPN Solution for Linux operating systems. Its High-Availability plugin implements a ClusterIP-based mechanism that is able to maintain IKE SAs and IPsec SAs in case of failover. The current release strongswan.x supports clusters of two nodes maximum. This section explains how the HA plug-in achieves active/active High Availability and Load Sharing capabilities. The IKE daemon of strongswan synchronizes the IKE state and the basic IPsec SA state without Sequence Numbers. The remaining tasks are carried out by a modified ClusterIP plugin called High Availability (HA). The HA plug-in requires two patches against the kernel in order to allow ClusterIP to work with IPsec. These patches modify the ClusterIP netfilter module, more specifically, the PREROUTING hook that marks received packets for forwarding before the decryption/encryption process. A third patch is required to modify the Linux firewall (iptables) in order to work over the patched kernel. A. IKE Daemon Implementation Daemon Hooks: a hook is a function that is in charge of collecting information (in this case Synchronization data) for later use in preparing messages that are going to be sent to other members in the cluster in order to notify SA state changes or pushing information towards the plugin. Hooks are created and registered by the plugin at the daemon bus. Table I shows the hooks used by the HA plugin. Synchronization messages: table II shows the different synchronization messages types that can be exchanged between nodes in a cluster according to the implemented HA plugin of strongswan. Messages are sent with no encryption by the hook functions using UDP datagrams on port 0. However, an IPsec tunnel could be established in order to transmit this information. State synchronization: state changes are executed by Synchronization messages exclusively. They carry all the information required to create a duplicate of the active node IKE SAs and IPsec SAs. Duplicated IKE SAs do not handle traffic and are installed in a PASSIVE state while duplicated IPsec SAs are installed in the Kernel and subjected to ClusterIP algorithms. Control messages : table III shows the different control messages implemented by the HA plugin. These messages are sent along with the synchronization messages with the purpose of notifying segment responsibility changes. Failover: the state of a segment in a cluster is set by the HA plugin to either ESTABLISHED or PASSIVE. This is decided on each node using the same ClusterIP hashing function based on the source IP address. By using the same hashing function it guarantees that the cluster responsibility will not be assigned to both nodes at the same time. The activation/deactivation of a segment is performed over all the IKE SAs that are found on that Hook Description ike keys( ) Receives IKE key material (DH, nonce, proposals) ike updown( ) Monitors state changes of IKE SAs message( ) Used to update IKE Message IDs child keys( ) Receives CHILD key material child state change( ) Monitors state changes of IPsec SAs Synch Message IKE ADD IKE UPDATE IKE MID I IKE MID R IKE DELETE TABLE I HOOKS USED BY THE STRONGSWAN S HA PLUGIN Description Message used when a new IKE SA is established. It contains all information to derive keys Message used to update information of a concerned IKE SA, for example, when authentication is done Updates the Message ID of the initiator Updates the Message ID of the responder It is used to delete a corresponding IKE SA CHILD ADD Message used when adding a new IPsec SA CHILD DELETE Message used to delete an IPsec SA TABLE II SYNCHRONIZATION MESSAGES OF THE HA PLUGIN actual segment. There is no impact on their IPsec SAs, they are always active. Node reintegration: reintegration is meant to take the failed node after its recovery and reinserting it into the cluster as a backup node again. The recently reincorporated node needs to fully synchronize the state information; this is achieved by pushing all the active IKE SAs messages, cached in the active node, onto the newly arrived node. Synchronizing IPsec SAs is not possible using the cache, as the messages do not contain Sequence Number information managed in the kernel. To reintegrate a node, the active node initiates rekeying on all IPsec SAs. VI. PERFORMANCE TESTS & RESULTS A. Testbed description Our performance tests are conducted in two different topologies, one with HA-plugin enabled (i.e. based on ClusterIP) and the second one with no HA features (i.e. no ClusterIP) to compare how ClusterIP improves the performances. The first scenario, shown in figure a, counts with an HTTP server, an IPsec peer and two VPN SGs; strongswan is configured to provide High-Availability cluster
7 Control Message SEG DROP SEG TAKE STATUS RESYNC Description Message to drop responsibility of segments Message to take responsibility of segments Heartbeat mechanism to prove liveness and segment responsibility Used to resynchronize a list of segments TABLE III CONTROL MESSAGES FOR SEGMENT CHANGES NOTIFICATION between the SGs and its members keep in synch through the Heart Beat link (Synch Channel). In the second topology, illustrated in figure b, the whole traffic goes through a single active SG, meaning that strongswan is used as a VPN solution but with no fail-over node, thus the HA plugin is not loaded. The results are represented in graphs with box-andwhiskers style. This kind of representation is mostly used to plot statistical data. For every measurement made (>000 samples per measure), the box-and-whisker plot indicates: (i) the smallest observation, (ii) the lower quartile, (iii) the upper quartile, (iv) the largest observation and (v) the median. The space between the lower and upper quartile represents 0% of the samples. For more clarifications, refer to []. During the tests, we used two different implementations (time and top) in order to measure the IPsec performance under different circumstances. The command time, launches the specified program command with given arguments. When the command has finished to run, time writes a message to the standard output giving timing statistics about this program run. The outputs of time are (i) the elapsed real time between invocation and termination of the command, (ii) the user CPU time or cpu-us spent executing instructions of the calling process and (iii) the system CPU time or cpu-sys spent in the system while executing tasks on behalf of the calling process. The command top, provides the real-time CPU activity. It shows a list of the ongoing system tasks. We identified the IPsec related task ID within this list and we collected all the information concerning the CPU consumption during the tests. All tests were done using different number of CPUs in order to compare the impact of having several CPUs sharing the workload (,, or CPUs). ) First Test - ClusterIP overhead Measurements Test: The purpose of this test is to evaluate how much CPU resources and time the modified ClusterIP adds to the whole VPN service. Note that when the HA plugin of strongswan is activated (i.e. a), for each incoming packet the modified ClusterIP hashes the IP header to check whether or not the SG is the 9... eth FTP SERVER COM GIGABIT SWITCH PORTS 9... FTP SERVER CLUSTERIP VPN ACTIVE GATEWAY (SG) 9... eth0 eth HEART BEAT LINK VPN PASSIVE GATEWAY (SG) eth:0 eth: (a) Scenario using ClusterIP 9... eth 9... COM GIGABIT SWITCH PORTS eth: VPN GATEWAY (SG) (b) Scenario NOT using ClusterIP Fig.. Scenarios COM GIGABIT SWITCH PORTS WORKSTATION WORKSTATION responsible node to handle that packet. This test is performed using both topologies described in figures a and b, thus comparing the impact of ClusterIP. The test consists of downloading a file of GB from an HTTP server (placed behind the SG) towards the peer by using the command wget on the peer s side. During the tests based on figure a, the HA plugin is enabled whereas during tests as in figure b the HA plugin is deactivated. We measured the CPU impact and the time spent by the system to complete an HTTP download (using the wget command). The IKEv exchanges are always protected with AES- SHA, whereas two different algorithms for ESP encryption were also analyzed throughout the test: AES-SHA and NULL-SHA (where NULL means no encryption, note that strongswan does not support no integrity check and it is always SHA). We also varied from one () to four (), the number of CPUs available on each SG; this allows analyzing the evolution of the CPU consumption of both types of encryption. As mentioned in VI-A, the CPU consumption and the download time (user and system time) are obtained through the top and time command respectively. CPU Consumption: figures a and c represent the CPU usage with no HA features. They implement different encryption algorithms. Figure c uses NULL encryption whereas figure a uses AES. When NULL encryption is used, packet treatment is improved and the CPU consumption decreases around 0%. The CPU consumption of the userland is practically the same for both cases. So, NULL encryption might improve CPU performance but it also might
8 CPU Usage (%) CPU Usage (%) CPU Usage (%) CPU Usage (%) Fig.. cpu-us cpu-sys CPU CPUs CPUs CPUs (a) Enc:AES - No HA-plugin cpu -us cpu- sys ACTIVE PASSIVE ACTIVE PASSIVE ACTIVE PASSIVE ACTIVE PASSIVE CPU CPUs CPUs CPUs (b) Enc:AES + HA-plugin cpu-us cpu-sys CPU CPUs CPUs CPUs (c) Enc:NULL + NO HA-plugin cpu-us cpu-sys ACTIVE PASSIVE ACTIVE PASSIVE ACTIVE PASSIVE ACTIVE PASSIVE CPU CPUs CPUs CPUs (d) Enc:NULL + HA-plugin First Test: Download Performance Test (CPU Usage) downgrade the security level as the flow is integrity protected but not encrypted. Considering AES and NULL encryption but with HA-plugin activated, figures b and d illustrate the CPU consumption and show with different active CPUs a to % CPU Usage. AES registers more activity (% to % of CPU Usage) than a node using NULL encryption (.%to % of CPU Usage). Once again, the CPU consumptions of the userland have the same behavior for both scenarios. As in AES with no HA-plugin, a peak is observed in the case where CPUs are used. We observe that the ClusterIP-based plugin is not well suited when CPUs are being used. Download Time: Results concerning the HTTP download time are shown in figures a, b, c and d. Two main scenarios are compared: the impact of HA-plugin on the download time and the impact of the encryption method used during these downloads. When no HA-plugin is used, AES- encryption introduces more System Time than when NULL encryption method is used. The System Time and the Elapsed Time (total time to complete the download) increase by % using AES. However, no variation is observed in the User Time, which means that the operating system always performs the same user mode tasks. Note that the modified ClusterIP requires the kernel to be patched in order to allow IPsec packet filtering. No variation of the User Time was observed when using the HA-plugin. It always stayed around s in all scenarios of the first test. Finally, when comparing the impact of the encryption methods showed that a cluster with AES takes around 0% more time to download than a download that uses NULL encryption. ) Second Test - QoS on an HTTP connection: The second test is evaluates the quality of service (QoS) ensured by the HA plugin in terms of upper-layers (E.g. HTTP-based downloads) reactivity. The test consists of downloading a file of size 0MB from the HTTP server towards the VPN peer. On the client side, we measured the Elapsed Time (obtained via the command time), which represents the time to complete the download. We do the same for both topologies (with & without HA-plugin, figures a and b correspondingly), thus comparing the impact of the HA-plugin and added overhead during the download. Both scenarios consider the encryption and integrity protection with AES and SHA algorithms respectively. With the ClusterIP-based plugin activated, both figures illustrate the time to download a file of size 0M B. Figures a, b show the download time through Ethernet connections. The User Time stays invariable. On the other hand, differences are observed when the HA-plugin is activated. The fact to decide either to treat or not a packet (by filtering at the IP layer), increases the System Time by %. Also the Elapsed Time increases by %, which introduce some overhead.
9 Time (s) 0 User time Elapsed time CPU CPUs CPUs CPUs 0 Time (s) User time Elapsed time CPU CPUs CPUs CPUs (a) Enc:AES - No HA-plugin (a) Enc:AES + NO HA-plugin Time (s) Time (s) Time (s) Fig.. User time Elapsed time 0 CPU CPUs CPUs CPUs 0 (b) Enc:AES + HA-plugin User time Elapsed time 0 CPU CPUs CPUs CPUs 0 (c) Enc:NULL + NO HA-plugin User time Elapsed time 0 CPU CPUs CPUs CPUs (d) Enc:NULL + HA-plugin First Test: Download Performance Test (time) Time (s) User time Elapsed time CPU CPUs CPUs CPUs.. Fig.. (b) Enc:AES + HA-plugin Second Test - QoS on an HTTP Connection Throughout this test, the fact of using,, or CPUs did not impact noticeably the download time. For example, figures a and b show that the behavior of the download time is very similar for each CPU scenario. Finally, as we can see, upper-layers might be impacted when this HA feature is activated. Administrators wanting to implement a cluster of VPN SGs should justify the need for this solution. A typical example is an environment where thousands of tunnels should be established, so letting the cluster to spread responsibility over different nodes, and thus spreading the load on each SG. Even if the load for a single connection would be slightly higher by using the HA-plugin, a real positive impact would be noticeable only when a large number of VPN connections are spread among the cluster members. ) Third Test - Interruption Time of an HTTP communication: When a failure event occurs, the ClusterIP module used by strongswan allows the cluster to switch transparently from the active node to the passive SG node. We concentrate on evaluating the handover network time (see figure b) during fail-over. The scenario is illustrated in figure a. The test consists of downloading a file of size 00M B from the HTTP server towards the VPN peer. After five seconds of download, we interrupt the outgoing network interface of the active VPN SG, causing a failure event. The passive SG of the
10 cluster stops receiving responses through the Synch Channel, and thus takes responsibility of the VPN tunnel. We captured the traffic between the VPN peer and the cluster during the test. Figure represents some protected ESP traffic at the IP layer. The period of time between the last ESP packet emitted by the active SG (SG) and the first ESP packet emitted by the passive SG (SG) is considered as the Handover Time. This time corresponds to the network delay of takeover from the active node to the passive SG. Figure represents the results obtained when measuring the Handover Time. The quartiles illustrate the download time. The black colored quartiles shows the download time during a fail-over event, taking seconds more than a download without interruption (colored in red). Note that the handover time (at the right-bottom and rightupper side) are illustrated with three vertical lines that represent the lower quartile, the median and the upper quartile. The handover time with no traffic control varies from.s to.s (right-bottom figure). This time is considered as network-friendly time to perform a fail-over. However, the difference between the download time on both scenarios (with and without fail-over) stays over s,.s,.s, and.s for,, and CPUs respectively. This overhead or difference is due to updating the IPsec databases. An update action is blocking the database and thus blocking the communication. This delay is expected to increase as the number of tunnel increases. Upper-layers treatment add more delay to the communication as well the system also takes some time in order to accomplish all tasks. The results are compliant to the expected s to s performances as required in strongswan s specifications. We also tested an additional Handover Time where the bandwidth limit is imposed to MBps, emulating the use case of a RAN (Radio Access Network). Once again, the network fail-over time remains between.9s and.s. The reason is that with reduced rates, the platform is not overloaded. The impact of the number of CPUs cannot be measured because, the time between heartbeat exchanges are dominant. Nevertheless, the No Failover case (colored in red), shows that the ClusterIP module has better performance when CPU or CPUs are being used. In terms of QoS, it should be considered only to use CPU or CPUs, instead of CPUs or CPUs. VII. CONCLUSIONS Throughout this article, we measured the impact and performance of using a modified ClusterIP module in order to clusterize SGs over IPsec. The availability of the IPsec service is improved thanks to the hot-standby clustering ensured by ClusterIP. Also, strongswan guarantees the continuity of an IPsec session thanks to its HA plug-in allowing to spread all the IPsec tunnels among its cluster members. Results showed that an active SG spends % to % of CPU more than a passif SG when clustering IPsec tunnels. We also observed that there is an additional load when using the HA-plugin of strongswan among the cluster members. Downloading a 00MB file takes % more time when using Download Time (s) No failover Simple Failover CPU CPUs CPUs CPUs Fig.. MBps CPU CPUs CPUs CPUs Third Test: Handover Time ClusterIP and the HA plug-in. As such, an administrator willing to implement this solution should take into account the performance costs of adding HA features to its VPN service. Furthermore, one main drawback of ClusterIP is its limitation to be deployed within a same network segment. Further investigation will consider transferring an IPsec/IKEv context between two SGs owning different IP addresses. Finally, we will also consider stress-tests by using a new load-tester plugin developed by strongswan. Future work will concentrate on using our own VPN tunnel management tool that allows IPsec transfer between SGs with different IP addresses. REFERENCES [] GPP-LTE, gpp system to wireless local area network (wlan) interworking; system description, ts., release 0, Standard, Mar. 0. [] A. Steffen., the OpenSource IPsec-based VPN Solution: StrongSwan. [Online]. Available: [] L. Yu, S. Jia, C. Xu, J. Guan, and D. Gao, An ipsec seamless switching mechanism with high availability and scalability by extending ikev protocol, IET Conference Publications, vol. 0, no. CP, 0. [] R. Hinden, Virtual Router Redundancy Protocol (VRRP), RFC (Draft Standard), Internet Engineering Task Force, Apr. 00, obsoleted by RFC 9. [Online]. Available: [] R. Singh, G. Kalyani, Y. Nir, Y. Sheffer, and D. Zhang, Protocol Support for High Availability of IKEv/IPsec, RFC (Proposed Standard), Internet Engineering Task Force, Jul. 0. [Online]. Available: [] P. Eronen, IKEv Mobility and Multihoming Protocol (MOBIKE), RFC (Proposed Standard), Internet Engineering Task Force, Jun. 00. [Online]. Available: [] D. Migault, MOBIKE extension (MOBIKE-X) for Transport Mobility and Multihomed IKE SA, (Work in Progress), Internet Engineering Task Force, Sep [Online]. Available: http: // [], IPsec mobility and multihoming requirements : Problem statement, (Work in Progress), Internet Engineering Task Force, Sep [Online]. Available: draft-mglt-ipsec-mm-requirements-00 [9] D. Migault and C. Williams, Multiple Interfaces IPsec Security Requirements, (Work in Progress), Internet Engineering Task Force, Mar. 0. [Online]. Available: doc/draft-mglt-mif-security-requirements/ [0] J. Loughney, M. Nakhjiri, C. Perkins, and R. Koodli, Context Transfer Protocol (CXTP), RFC 0 (Experimental), Internet Engineering Task Force, Jul. 00. [Online]. Available: Handover Time (s) 9
11 [] F. Allard, J.-M. Bonnin, J.-M. Combes, and J. Bournelle, IKE Context Transfer in an IPv Mobility Environment, in MobiArch 0, août, Seattle (WA), USA. FT - France Télécom, Division R&D, Issy Les Moulineaux (France Télécom), RSM - Dépt. Réseaux, Sécurité et Multimédia (Institut Mines-Télécom-Télécom Bretagne-UEB), 00. [] D. Palomares, Mechanisms to Ensure Continuity of Service for IPsec/IKEv Based Communications, in ICSNA-0: International Conference on Secure Networking and Applications,- October, Paris, France. FT - France Télécom, Division R&D, Issy Les Moulineaux (France Télécom), 0. [] Wikipedia, Boxplot Wikipedia The Free Encyclopedia. [Online]. Available: plot 0
Étude de Mécanismes Assurant la Continuité de Service de Protocoles IKEv2 et IPsec
THÈSE DE DOCTORAT CONJOINT TÉLÉCOM SUDPARIS et L UNIVERSITÉ PIERRE ET MARIE CURIE Spécialité: École doctorale: Informatique, Télécommunications et Électronique de Paris Présentée par Daniel Palomares Velasquez
Astaro Deployment Guide High Availability Options Clustering and Hot Standby
Connect With Confidence Astaro Deployment Guide Clustering and Hot Standby Table of Contents Introduction... 2 Active/Passive HA (Hot Standby)... 2 Active/Active HA (Cluster)... 2 Astaro s HA Act as One...
APNIC elearning: IPSec Basics. Contact: [email protected]. esec03_v1.0
APNIC elearning: IPSec Basics Contact: [email protected] esec03_v1.0 Overview Virtual Private Networks What is IPsec? Benefits of IPsec Tunnel and Transport Mode IPsec Architecture Security Associations
High Availability and Clustering
High Availability and Clustering AdvOSS-HA is a software application that enables High Availability and Clustering; a critical requirement for any carrier grade solution. It implements multiple redundancy
CSCI 454/554 Computer and Network Security. Topic 8.1 IPsec
CSCI 454/554 Computer and Network Security Topic 8.1 IPsec Outline IPsec Objectives IPsec architecture & concepts IPsec authentication header IPsec encapsulating security payload 2 IPsec Objectives Why
Introducing Reliability and Load Balancing in Mobile IPv6 based Networks
Introducing Reliability and Load Balancing in Mobile IPv6 based Networks Jahanzeb Faizan Southern Methodist University Dallas, TX, USA [email protected] Hesham El-Rewini Southern Methodist University
Viewing VPN Status, page 335. Configuring a Site-to-Site VPN, page 340. Configuring IPsec Remote Access, page 355
VPN This chapter describes how to configure Virtual Private Networks (VPNs) that allow other sites and remote workers to access your network resources. It includes the following sections: About VPNs, page
Implementing and Managing Security for Network Communications
3 Implementing and Managing Security for Network Communications............................................... Terms you ll need to understand: Internet Protocol Security (IPSec) Authentication Authentication
High Performance Cluster Support for NLB on Window
High Performance Cluster Support for NLB on Window [1]Arvind Rathi, [2] Kirti, [3] Neelam [1]M.Tech Student, Department of CSE, GITM, Gurgaon Haryana (India) [email protected] [2]Asst. Professor,
IP Security. Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49
IP Security Ola Flygt Växjö University, Sweden http://w3.msi.vxu.se/users/ofl/ [email protected] +46 470 70 86 49 1 Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security
TrustNet CryptoFlow. Group Encryption WHITE PAPER. Executive Summary. Table of Contents
WHITE PAPER TrustNet CryptoFlow Group Encryption Table of Contents Executive Summary...1 The Challenges of Securing Any-to- Any Networks with a Point-to-Point Solution...2 A Smarter Approach to Network
Cisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.
Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic. A Network and Data Link Layer infrastructure Design to Improve QoS in Voice and video Traffic Jesús Arturo Pérez,
LinkProof And VPN Load Balancing
LinkProof And Load Balancing Technical Application Note May 2008 North America Radware Inc. 575 Corporate Dr. Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware Ltd. 22 Raoul Wallenberg
Lecture 17 - Network Security
Lecture 17 - Network Security CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Idea Why donʼt we just integrate some of these neat
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,[email protected]
Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity
Basic Security Requirements and Techniques Confidentiality The property that stored or transmitted information cannot be read or altered by an unauthorized party Integrity The property that any alteration
Internet Protocol Security IPSec
Internet Protocol Security IPSec Summer Semester 2011 Integrated Communication Systems Group Ilmenau University of Technology Outline Introduction Authentication Header (AH) Encapsulating Security Payload
Cisco Wireless Security Gateway R2
Cisco Wireless Security Gateway R2 Product Overview The Cisco Wireless Security Gateway (WSG) is a highly scalable solution for tunneling femtocell, Unlicensed Mobile Access (UMA)/Generic Access Network
Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM
Lab 4.4.8a Configure a Cisco GRE over IPSec Tunnel using SDM Objective Scenario Topology In this lab, the students will complete the following tasks: Prepare to configure Virtual Private Network (VPN)
A New Approach to Developing High-Availability Server
A New Approach to Developing High-Availability Server James T. Yu, Ph.D. School of Computer Science, Telecommunications, and Information Systems DePaul University [email protected] ABSTRACT This paper
Mobility management and vertical handover decision making in heterogeneous wireless networks
Mobility management and vertical handover decision making in heterogeneous wireless networks Mariem Zekri To cite this version: Mariem Zekri. Mobility management and vertical handover decision making in
Case Study for Layer 3 Authentication and Encryption
CHAPTER 2 Case Study for Layer 3 Authentication and Encryption This chapter explains the basic tasks for configuring a multi-service, extranet Virtual Private Network (VPN) between a Cisco Secure VPN Client
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Flauncher and DVMS Deploying and Scheduling Thousands of Virtual Machines on Hundreds of Nodes Distributed Geographically
Flauncher and Deploying and Scheduling Thousands of Virtual Machines on Hundreds of Nodes Distributed Geographically Daniel Balouek, Adrien Lèbre, Flavien Quesnel To cite this version: Daniel Balouek,
VPNs. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
VPNs Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Security Engineering Part III Network Security. Security Protocols (II): IPsec
Security Engineering Part III Network Security Security Protocols (II): IPsec Juan E. Tapiador [email protected] Department of Computer Science, UC3M Security Engineering 4th year BSc in Computer Science,
Internet Firewall CSIS 3230. Internet Firewall. Spring 2012 CSIS 4222. net13 1. Firewalls. Stateless Packet Filtering
Internet Firewall CSIS 3230 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 8.8: Packet filtering, firewalls, intrusion detection Ch
IPsec Details 1 / 43. IPsec Details
Header (AH) AH Layout Other AH Fields Mutable Parts of the IP Header What is an SPI? What s an SA? Encapsulating Security Payload (ESP) ESP Layout Padding Using ESP IPsec and Firewalls IPsec and the DNS
Introduction. Technology background
White paper: Redundant IP-VPN networks Introduction IP VPN solutions based on the IPsec protocol are already available since a number of years. The main driver for these kinds of solutions is of course
Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance
Virtual Private Network VPN IPSec Testing: Functionality Interoperability and Performance Johnnie Chen Project Manager of Network Security Group Network Benchmarking Lab Network Benchmarking Laboratory
Chapter 9 Monitoring System Performance
Chapter 9 Monitoring System Performance This chapter describes the full set of system monitoring features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. You can be alerted to important
INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
Securing IP Networks with Implementation of IPv6
Securing IP Networks with Implementation of IPv6 R.M.Agarwal DDG(SA), TEC Security Threats in IP Networks Packet sniffing IP Spoofing Connection Hijacking Denial of Service (DoS) Attacks Man in the Middle
Availability Digest. www.availabilitydigest.com. Redundant Load Balancing for High Availability July 2013
the Availability Digest Redundant Load Balancing for High Availability July 2013 A large data center can comprise hundreds or thousands of servers. These servers must not only be interconnected, but they
Firewall Troubleshooting
Firewall Troubleshooting (Checkpoint Specific) For typical connectivity issues where a firewall is in question follow these steps to eliminate any issues relating to the firewall. Firewall 1. From the
Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch.
Network Address Translation (NAT) Adapted from Tannenbaum s Computer Network Ch.5.6; computer.howstuffworks.com/nat1.htm; Comer s TCP/IP vol.1 Ch.20 Long term and short term solutions to Internet scalability
The BANDIT Products in Virtual Private Networks
encor! enetworks TM Version A.1, March 2010 2010 Encore Networks, Inc. All rights reserved. The BANDIT Products in Virtual Private Networks One of the principal features of the BANDIT products is their
Network Security. Lecture 3
Network Security Lecture 3 Design and Analysis of Communication Networks (DACS) University of Twente The Netherlands Security protocols application transport network datalink physical Contents IPSec overview
Chapter 1 - Web Server Management and Cluster Topology
Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management
Secured VPN Models for LTE Backhaul Networks
Secured VPN Models for LTE Backhaul Networks Madhusanka Liyanage, Andrei Gurtov Centre for Wireless Communications University of Oulu, P.O. Box 45, FI-914 Oulu, Finland Email: [madhusanka, gurtov]@ee.oulu.fi
Configuring Dual VPNs with Dual ISP Links Using ECMP Tech Note PAN-OS 7.0
Configuring Dual VPNs with Dual ISP Links Using ECMP Tech Note PAN-OS 7.0 Revision A 2015, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Use Case... 3 Equal Cost MultiPath (ECMP)...
VPN. VPN For BIPAC 741/743GE
VPN For BIPAC 741/743GE August, 2003 1 The router supports VPN to establish secure, end-to-end private network connections over a public networking infrastructure. There are two types of VPN connections,
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode
13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) PPP-based remote access using dial-in PPP encryption control protocol (ECP) PPP extensible authentication protocol (EAP) 13.2 Layer 2/3/4
Fault tolerant stateful firewalling with GNU/Linux. Pablo Neira Ayuso <[email protected]> Proyecto Netfilter <[email protected]> University of Sevilla
Fault tolerant stateful firewalling with GNU/Linux Pablo Neira Ayuso Proyecto Netfilter University of Sevilla Outline Introduction: Stateless and stateful firewalls
Using IPSec in Windows 2000 and XP, Part 2
Page 1 of 8 Using IPSec in Windows 2000 and XP, Part 2 Chris Weber 2001-12-20 This is the second part of a three-part series devoted to discussing the technical details of using Internet Protocol Security
WAN Traffic Management with PowerLink Pro100
Whitepaper WAN Traffic Management with PowerLink Pro100 Overview In today s Internet marketplace, optimizing online presence is crucial for business success. Wan/ISP link failover and traffic management
ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004
ZyWALL 5 Internet Security Appliance Quick Start Guide Version 3.62 (XD.0) May 2004 Introducing the ZyWALL The ZyWALL 5 is the ideal secure gateway for all data passing between the Internet and the LAN.
Monitoring Remote Access VPN Services
CHAPTER 5 A remote access service (RAS) VPN secures connections for remote users, such as mobile users or telecommuters. RAS VPN monitoring provides all of the most important indicators of cluster, concentrator,
Chapter 5 Virtual Private Networking Using IPsec
Chapter 5 Virtual Private Networking Using IPsec This chapter describes how to use the IPsec virtual private networking (VPN) features of the ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN to provide
DirectAccess in Windows 7 and Windows Server 2008 R2. Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team
DirectAccess in Windows 7 and Windows Server 2008 R2 Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team 0 Introduction to DirectAccess Increasingly, people envision a world
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
hp ProLiant network adapter teaming
hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2
Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1
Configuring an IPSec Tunnel between a Firebox & a Check Point FireWall-1 This document describes how to configure an IPSec tunnel with a WatchGuard Firebox II or Firebox III (software version 4.5 or later)
Chapter 7. Firewalls http://www.redhat.com/docs/manuals/enterprise/rhel-4-manual/security-guide/ch-fw.html
Red Hat Docs > Manuals > Red Hat Enterprise Linux Manuals > Red Hat Enterprise Linux 4: Security Guide Chapter 7. Firewalls http://www.redhat.com/docs/manuals/enterprise/rhel-4-manual/security-guide/ch-fw.html
DATA CENTER. Best Practices for High Availability Deployment for the Brocade ADX Switch
DATA CENTER Best Practices for High Availability Deployment for the Brocade ADX Switch CONTENTS Contents... 2 Executive Summary... 3 Introduction... 3 Brocade ADX HA Overview... 3 Hot-Standby HA... 4 Active-Standby
TABLE OF CONTENTS NETWORK SECURITY 2...1
Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003
http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
Network Agent Quick Start
Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense
SonicOS Enhanced 3.2 IKE Version 2 Support
SonicOS Enhanced 3.2 IKE Version 2 Support Document Scope This document describes the integration of SonicOS Enhanced 3.2 with Internet Key Exchange protocol version 2 (IKEv2). This document contains the
Funkwerk UTM Release Notes (english)
Funkwerk UTM Release Notes (english) General Hints Please create a backup of your UTM system's configuration (Maintenance > Configuration > Manual Backup) before you start to install the software update.
Seamless Roaming in a Remote Access VPN Environment
Always on If we look just a few years into the future, the office warrior who works exclusively onsite will be a scarce phenomenon. Instead, these busy professionals will use PCs, smartphones, and tablets
Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)
Security Protocols Security Protocols Necessary to communicate securely across untrusted network Provide integrity, confidentiality, authenticity of communications Based on previously discussed cryptographic
12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust
Security in Wireless LANs and Mobile Networks Wireless Magnifies Exposure Vulnerability Information going across the wireless link is exposed to anyone within radio range RF may extend beyond a room or
VPN with Windows 7 and Linux strongswan using IKEv2
Swiss Cyber Storm II Hack & Learn VPN with Windows 7 and Linux strongswan using IKEv2 Prof. Dr. Andreas Steffen [email protected] Andreas Steffen, 19.04.2009, CyberStormII.pptx 1 The Road Warrior
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
TheGreenBow IPsec VPN Client. Configuration Guide Cisco RV325 v1. Website: www.thegreenbow.com Contact: [email protected]
TheGreenBow IPsec VPN Client Configuration Guide Cisco RV325 v1 Website: www.thegreenbow.com Contact: [email protected] Table of Contents 1 Introduction... 3 1.1 Goal of this document... 3 1.2 VPN
Chapter 4 Virtual Private Networking
Chapter 4 Virtual Private Networking This chapter describes how to use the virtual private networking (VPN) features of the FVL328 Firewall. VPN tunnels provide secure, encrypted communications between
EMC VNX Series: Introduction to SMB 3.0 Support
White Paper EMC VNX Series: Introduction to SMB 3.0 Support Abstract This white paper introduces the Server Message Block (SMB) 3.0 support available on the EMC VNX and the advantages gained over the previous
Chapter 5: Network Layer Security
Managing and Securing Computer Networks Guy Leduc Mainly based on Network Security - PRIVATE Communication in a PUBLIC World C. Kaufman, R. Pearlman, M. Speciner Pearson Education, 2002. (chapters 17 and
FP-Hadoop: Efficient Execution of Parallel Jobs Over Skewed Data
FP-Hadoop: Efficient Execution of Parallel Jobs Over Skewed Data Miguel Liroz-Gistau, Reza Akbarinia, Patrick Valduriez To cite this version: Miguel Liroz-Gistau, Reza Akbarinia, Patrick Valduriez. FP-Hadoop:
Scalable Linux Clusters with LVS
Scalable Linux Clusters with LVS Considerations and Implementation, Part I Eric Searcy Tag1 Consulting, Inc. [email protected] April 2008 Abstract Whether you are perusing mailing lists or reading
UTM - VPN: Configuring a Site to Site VPN Policy using Main Mode (Static IP address on both sites) i...
Page 1 of 10 Question/Topic UTM - VPN: Configuring a Site to Site VPN Policy using Main Mode (Static IP address on both sites) in SonicOS Enhanced Answer/Article Article Applies To: SonicWALL Security
Networking Topology For Your System
This chapter describes the different networking topologies supported for this product, including the advantages and disadvantages of each. Select the one that best meets your needs and your network deployment.
CCNA Security 1.1 Instructional Resource
CCNA Security 1.1 Instructional Resource Chapter 8 Implementing Virtual Private Networks 2012 Cisco and/or its affiliates. All rights reserved. 1 Describe the purpose and types of VPNs and define where
Top-Down Network Design
Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,
Rohde & Schwarz R&S SITLine ETH VLAN Encryption Device Functionality & Performance Tests
Rohde & Schwarz R&S Encryption Device Functionality & Performance Tests Introduction Following to our test of the Rohde & Schwarz ETH encryption device in April 28 the European Advanced Networking Test
Comparing Mobile VPN Technologies WHITE PAPER
Comparing Mobile VPN Technologies WHITE PAPER Executive Summary Traditional approaches for encrypting data in transit such as IPSec and SSL are intended for wired networks with high speed, highly reliable
50. DFN Betriebstagung
50. DFN Betriebstagung IPS Serial Clustering in 10GbE Environment Tuukka Helander, Stonesoft Germany GmbH Frank Brüggemann, RWTH Aachen Slide 1 Agenda Introduction Stonesoft clustering Firewall parallel
Fault Tolerance in the Internet: Servers and Routers
Fault Tolerance in the Internet: Servers and Routers Sana Naveed Khawaja, Tariq Mahmood Research Associates Department of Computer Science Lahore University of Management Sciences Motivation Client Link
Branch Office VPN Tunnels and Mobile VPN
WatchGuard Certified Training Branch Office VPN Tunnels and Mobile VPN Fireware XTM and WatchGuard System Manager v11.7 Revised: January 2013 Updated for: Fireware XTM v11.7 Notice to Users Information
Monitoring Traffic manager
Monitoring Traffic manager eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku
Univerzita Komenského v Bratislave Fakulta matematiky, fyziky a informatiky Príprava štúdia matematiky a informatiky na FMFI UK v anglickom jazyku ITMS: 26140230008 dopytovo orientovaný projekt Moderné
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
Planet CS-1000. TheGreenBow IPSec VPN Client. Configuration Guide. http://www.thegreenbow.com [email protected]
TheGreenBow IPSec VPN Client Configuration Guide Planet CS-1000 WebSite: Contact: http://www.thegreenbow.com [email protected] IPSec VPN Router Configuration Property of TheGreenBow Sistech SA -
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
WAN Failover Scenarios Using Digi Wireless WAN Routers
WAN Failover Scenarios Using Digi Wireless WAN Routers This document discusses several methods for using a Digi wireless WAN gateway to provide WAN failover for IP connections in conjunction with another
Mobile IP Part I: IPv4
Mobile IP Part I: IPv4 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse574-06/ 12-1 q Mobile
SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE
VSPEX IMPLEMENTATION GUIDE SILVER PEAK ACCELERATION WITH EMC VSPEX PRIVATE CLOUD WITH RECOVERPOINT FOR VMWARE VSPHERE Silver Peak Abstract This Implementation Guide describes the deployment of Silver Peak
Configuring a Lan-to-Lan VPN with Overlapping Subnets with Juniper NetScreen/ISG/SSG Products
Application Note Configuring a Lan-to-Lan VPN with Overlapping Subnets with Juniper NetScreen/ISG/SSG Products Version 1.0 January 2008 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, CA 94089
Firewalls. Ahmad Almulhem March 10, 2012
Firewalls Ahmad Almulhem March 10, 2012 1 Outline Firewalls The Need for Firewalls Firewall Characteristics Types of Firewalls Firewall Basing Firewall Configurations Firewall Policies and Anomalies 2
Apliware firewall. TheGreenBow IPSec VPN Client. Configuration Guide. http://www.thegreenbow.com [email protected]
TheGreenBow IPSec VPN Client Configuration Guide Apliware firewall WebSite: Contact: http://www.thegreenbow.com [email protected] Table of contents 1 Introduction... 0 1.1 Goal of this document...
PolyServe Understudy QuickStart Guide
PolyServe Understudy QuickStart Guide PolyServe Understudy QuickStart Guide POLYSERVE UNDERSTUDY QUICKSTART GUIDE... 3 UNDERSTUDY SOFTWARE DISTRIBUTION & REGISTRATION... 3 Downloading an Evaluation Copy
Clustering. Configuration Guide IPSO 6.2
Clustering Configuration Guide IPSO 6.2 August 13, 2009 Contents Chapter 1 Chapter 2 Chapter 3 Overview of IP Clustering Example Cluster... 9 Cluster Management... 11 Cluster Terminology... 12 Clustering
