Group 12 Lee, Tony 301111050 leetonyl@sfu.ca Nguyen, Anthony 301110184 anthonyn@sfu.ca Truong, Henson 301114646 hensont@sfu.ca



From this document you will learn the answers to the following questions:

What was the time elapsed between sending and receiving the response packet?

What group Analyze the security of VPN?

Who was the person who used the VPN?

Similar documents
The Analysis and Simulation of VoIP

THE ANALYSIS AND SIMULATION OF VOIP

Analysis and Simulation of VoIP LAN vs. WAN WLAN vs. WWAN

ENSC 427: Communication Networks

VPN Lesson 2: VPN Implementation. Summary

Testing Network Security Using OPNET

Advanced Higher Computing. Computer Networks. Homework Sheets

ENSC 427: COMMUNICATION NETWORKS Simulation and Analysis of Wi-Fi Performance in campus network

SUNYIT. Reaction Paper 2. Measuring the performance of VoIP over Wireless LAN

Quality of Service Analysis of Video Conferencing over WiFi and Ethernet Networks

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Configuring Check Point VPN-1/FireWall-1 and SecuRemote Client with Avaya IP Softphone via NAT - Issue 1.0

Analysis of Performance of VoIP

ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP

Analysis of Mobile IP in Wireless LANs

Lab 1: Evaluating Internet Connection Choices for a Small Home PC Network

1.1. Abstract VPN Overview

Spring Final Project Report

The Advantages of Using EIGRP on an Enterprise Network

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Case Study for Layer 3 Authentication and Encryption

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions

Computer Networks. Secure Systems

The Analysis of Firewall and VPN in Enterprise Network Performances

Key Term Quiz Answers

Based on the VoIP Example 1(Basic Configuration and Registration), we will introduce how to dial the VoIP call through an encrypted VPN tunnel.

Creating a VPN Using Windows 2003 Server and XP Professional

Technical White Paper

Home Networking Evaluating Internet Connection Choices for a Small Home PC Network

NETWORK DESIGN BY USING OPNET IT GURU ACADEMIC EDITION SOFTWARE

PERFORMANCE ANALYSIS OF VOIP TRAFFIC OVER INTEGRATING WIRELESS LAN AND WAN USING DIFFERENT CODECS

Application Note. Onsight Connect Network Requirements v6.3

JARGON BUSTER CONNECTING WALES

Chapter 5. Data Communication And Internet Technology

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

5.0 Network Architecture. 5.1 Internet vs. Intranet 5.2 NAT 5.3 Mobile Network

Tech-Note Bridges Vs Routers Version /06/2009. Bridges Vs Routers

Answer: Can be used on smart phones/ipad/tablets OR can be used anywhere that has an internet connection. Do not mention anything to do with cost

Firewall and VPN Investigation on Cloud Computing Performance

Internet Privacy Options

Cisco Discovery 3: Introducing Routing and Switching in the Enterprise hours teaching time

Explaining DMZ s and Port Forwarding for home networking, broadband routers, and NAT connection sharing. First some definitions (greatly simplified)

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Virtual Private Networks

Cisco Packet Tracer 6.3 Frequently Asked Questions

Edgewater Routers User Guide

Figure 41-1 IP Filter Rules

"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"

Technical papers Virtual private networks

Check Point FW-1/VPN-1 NG/FP3

VPN. Date: 4/15/2004 By: Heena Patel

QoS:What Is It? Why Do We Need It?

Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the

Information Technology Career Field Pathways and Course Structure

Figure 1: Bandwidth and coverage of wireless technologies [2].

Edgewater Routers User Guide

IINS Implementing Cisco IOS Network Security Exam.

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Greenbow VPN Client with Teldat VPN Server. Configuration Highlights

Web Foundations Series Internet Business Associate

Cisco. A Beginner's Guide Fifth Edition ANTHONY T. VELTE TOBY J. VELTE. City Milan New Delhi Singapore Sydney Toronto. Mc Graw Hill Education

Castelldefels Project: Simulating the Computer System that Gives Support to the Virtual Campus of the Open University of Catalonia

Applications. Network Application Performance Analysis. Laboratory. Objective. Overview

How To Understand And Understand The Security Of A Key Infrastructure

CompTIA Network+ (Exam N10-005)

Modeling and Simulation of Queuing Scheduling Disciplines on Packet Delivery for Next Generation Internet Streaming Applications

ISG50 Application Note Version 1.0 June, 2011

SBSCET, Firozpur (Punjab), India

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Scenario: IPsec Remote-Access VPN Configuration

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Cisco Which VPN Solution is Right for You?

White Paper. Securing and Integrating File Transfers Over the Internet

CCNA. Course Fee: 8500 INR (Lab Access, Software s, Books, Tool Kits & Tax Included) Course Duration: 5 Days

Internet Security. Internet Security Voice over IP. Introduction. ETSF10 Internet Protocols ETSF10 Internet Protocols 2011

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Managing Central Monitoring in Distributed Systems

Introduction. Technology background

FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE

Quality of Service Analysis of site to site for IPSec VPNs for realtime multimedia traffic.

SSVVP SIP School VVoIP Professional Certification

multi-site, private networking service Uses MPLS access-agnostic transport routing intelligence in the network Class of Service (CoS)

CompTIA Exam N CompTIA Network+ certification Version: 5.1 [ Total Questions: 1146 ]

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Configure a Microsoft Windows Workstation Internal IP Stateful Firewall

Configuration Guide. How to set up the IPSec site-to-site Tunnel between the D-Link DSR Router and the Cisco Firewall. Overview

IxLoad-Attack: Network Security Testing

M2M Series Routers. Port Forwarding / DMZ Setup

Exam Questions SY0-401

Contents. Overview. Features walkthrough. Application scenarios

Scenario 1: One-pair VPN Trunk

CISCO IOS NETWORK SECURITY (IINS)

WiMAX System-Level Simulation for Application Performance Analysis

GV-iView HD V1 for ipad

Cisco Application Networking for BEA WebLogic

Synology QuickConnect

How To Configure SSL VPN in Cyberoam

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

Cisco Application Networking for IBM WebSphere

Transcription:

ENSC 427: COMMUNICATION NETWORKS SPRING 2014 Final Project Presentation Analysis of Applications Through IP VPN www.sfu.ca/~leetonyl/ensc427group12.html Group 12 Lee, Tony 301111050 leetonyl@sfu.ca Nguyen, Anthony 301110184 anthonyn@sfu.ca Truong, Henson 301114646 hensont@sfu.ca

Overview Introduction Related Works Background Information OPNET Simulation Results Conclusion Future work References 2

Introduction Goal Analyze the performance of applications through a VPN connection Motivation Corporations deploy VPNs to secure access to their servers and we want to determine trade offs in using a VPN 3

Overview Introduction Related Works Background Information OPNET Simulation Results Conclusion Future work References 4

Related Works Spring 2012 Group 2 o Analyzed the security of VPN and firewall Spring 2012 Group 12 o Performance of VPN under heavy network load 5

Overview Introduction Related Works Background Information OPNET Simulation Results Conclusion Future work References 6

What is Virtual Private Network (VPN)? A private network that uses a public network as a pathway to connect remote sites or users together Uses Tunneling - encapsulation of packet in another packet before it is transported over the Internet Provides end to end security - encrypt packet when being sent out and decrypt packet upon arrival 7

Establishing a VPN Connection To establish a VPN connection,the client creates a tunnel spanning across the Internet and firewall, to the VPN server The firewall only allows the packets from the VPN client through Composed of 3 components: Client Firewall VPN Server 8

Two Kinds of VPN Remote Access o o Connection from mobile location to a central resource E.g. Individual connection to a office Site to site o o Connection from a permanent location to a central resource E.g. Offices to other offices Our project uses Remote Access 9

Overview Introduction Related Works Background Information OPNET Simulation Results Conclusion Future work References 10

Simulation Multiple clients accessing a central server Applications Database File Transfer Protocol (FTP) Email HyperText Transfer Protocol (HTTP) Remote Login Compare response time between no VPN vs VPN Compare response time between clients of varying distances 11

Simulation: Topology #1 Host Server: Vancouver Multiple Clients: Toronto PPP DS1 links connecting clients to router and router to IP cloud 12

Simulation: Topology #2 Host Server: Vancouver Multiple Clients: London, England PPP DS1 links connecting clients to router and router to IP cloud 13

Simulation: DDOS Scenario Additional attacker clients in the Internet Attacker client profiles heavy applications Server access Unrestricted vs. VPN only 14

Overview Introduction Related Works Background Information OPNET Simulation Results Conclusion Future work References 15

Results: Database Response Time Response Time: Time elapsed between sending a request and receiving the response packet 25ms longer to London London: 0.7ms VPN delay Toronto: 0.7ms VPN delay 16

Results: Email Download Response Time Download Response Time: Time elapsed between sending request for email and receiving emails from email server 80ms longer to London London: 3ms VPN delay Toronto: 3ms VPN delay 17

Results: FTP Download Response Time Download Response Time: Time elapsed between sending a request and receiving the response packet 80ms longer to London London: 2ms VPN delay Toronto: 2ms VPN delay 18

Results: HTTP Page Response Time Page Response Time: Time required to retrieve the entire page with all the objects 80ms longer to London London: 2ms VPN delay Toronto: 2ms VPN delay 19

Results: Remote Login Response Time Response Time: Time elapsed between sending a request and receiving the response packet 30ms longer to London London: 1ms VPN delay Toronto: 1ms VPN delay 20

Results: DDOS - Server Performance Load Server Load: Rate at which requests for any application arrives at the server 21

Overview Introduction Related Works Background Information OPNET Simulation Results Conclusion Future work References 1

Conclusion VPN introduces an increase delay in response o OK for Database,Email,FTP,HTTP o Bad for Remote Login real time user experience For DDOS scenario Server protection from DDOS attacks o Only authorized external clients via VPN VPN provides security in exchange for application delay 23

Overview Introduction Related Works Background Information OPNET Simulation Results Conclusion Future work References 24

Future work Implementing a scenario where wireless networks are involved (e.g. WiMAX) because many users work out in the field Simulating a more realistic scenario o more clients and central servers Incorporating VoIP and video conferencing through a VPN 25

Overview Introduction Related Works Background Information OPNET Simulation Results Conclusion Future work References 26

References [1] (12 March 2014) F. Parkar and K. Wong, "Analysis of IP VPN Performance." [Online]. Available: http://www2.ensc.sfu.ca/~ljilja/ensc427/spring12/projects/team12/ensc427_group12_finalre port_spring2012.pdf. [2] (22 March 2014) Firewalls and VPN Networks, [Online]. Available: http://www.eng.tau.ac.il/~netlab/resources/booklet/lab11.pdf. [3] (22 March 2014) How much does VPN slow my Internet down?, Cactus VPN, [Online]. Available: www.cactusvpn.com/vpn/vpn-slow-internet-connection. [4] (4 April 2014) P. Ferguson, Cisco Systems and G. Huston, Telstra, What Is a VPN?, Cisco, [Online]. Available: http://www.cisco.com/web/about/ac123/ac147/archived_issues/ipj_1-1/what_is_a_vpn.html. [5] (12 February 2014) S. Hussein and A. Hadi, "The Impact of Using Security Protocols in Dedicated Private Network and Virtual Private Network," International Journal of Scientific and Technology Research, [Online]. 11(2), pp. 170-175. Available: http://www.ijstr.org/final- print/nov2013/the-impact-of-using-security-protocols-in-dedicated-private-network-and- Virtual-Private-Network.pdf. 27