Virtual Private Networks (VPN) VPN. Agenda. Classical VPN s



Similar documents
VPN. Date: 4/15/2004 By: Heena Patel

Cisco Which VPN Solution is Right for You?

Other VPNs TLS/SSL, PPTP, L2TP. Advanced Computer Networks SS2005 Jürgen Häuselhofer

Firewalls and Virtual Private Networks

CS 393/682 Network Security. Nasir Memon Polytechnic University Module 7 Virtual Private Networks

I. What is VPN? II. Types of VPN connection. There are two types of VPN connection:

Intranet Security Solution

21.4 Network Address Translation (NAT) NAT concept

Chapter 9. IP Secure

How Virtual Private Networks Work

7.1. Remote Access Connection

Ethernet. Ethernet. Network Devices

Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.

MPLS VPN. Agenda. MP-BGP VPN Overview MPLS VPN Architecture MPLS VPN Basic VPNs MPLS VPN Complex VPNs MPLS VPN Configuration (Cisco) L86 - MPLS VPN

Post-Class Quiz: Telecommunication & Network Security Domain

Chapter 10 Security Protocols of the Data Link Layer

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Chapter 12 Supporting Network Address Translation (NAT)

Internet Protocol: IP packet headers. vendredi 18 octobre 13

Optimizing Networks for NASPI

How Virtual Private Networks Work

Virtual Private Networks

WAN Data Link Protocols

IP Security. IPSec, PPTP, OpenVPN. Pawel Cieplinski, AkademiaWIFI.pl. MUM Wroclaw

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Virtual Private Networks

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Virtual Private Network and Remote Access Setup

Introduction to MPLS-based VPNs

SEC , Cisco Systems, Inc. All rights reserved.

Technical papers Virtual private networks

MP PLS VPN MPLS VPN. Prepared by Eng. Hussein M. Harb

How To Configure L2TP VPN Connection for MAC OS X client

CS419: Computer Networks. Lecture 9: Mar 30, 2005 VPNs

Introduction to Security and PIX Firewall

VPN SECURITY. February The Government of the Hong Kong Special Administrative Region

Security of the MPLS Architecture

"Charting the Course...

White Paper. Cisco MPLS based VPNs: Equivalent to the security of Frame Relay and ATM. March 30, 2001

Virtual Private Networks

Using OSPF in an MPLS VPN Environment

MPLS Implementation MPLS VPN

Matrix Technical Support Mailer 167 NAVAN CNX200 PPTP VPN with Windows Client

Virtual Private Network and Remote Access

GPRS / 3G Services: VPN solutions supported

RFC 2547bis: BGP/MPLS VPN Fundamentals

MPLS VPN Technology. Overview. Outline

Proxy Server, Network Address Translator, Firewall. Proxy Server

How To Learn Cisco Cisco Ios And Cisco Vlan

Asynchronous Transfer Mode: ATM. ATM architecture. ATM: network or link layer? ATM Adaptation Layer (AAL)

MPLS over IP-Tunnels. Mark Townsley Distinguished Engineer. 21 February 2005

Network Access Security. Lesson 10

Chapter 4: Security of the architecture, and lower layer security (network security) 1

IP Tunneling and VPNs

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking

Ficha técnica de curso Código: IFCAD111

We will give some overview of firewalls. Figure 1 explains the position of a firewall. Figure 1: A Firewall

VPN. VPN For BIPAC 741/743GE

PRASAD ATHUKURI Sreekavitha engineering info technology,kammam

L2F Case Study Overview

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

High-Level Data Link Control

SBSCET, Firozpur (Punjab), India

IP/MPLS-Based VPNs Layer-3 vs. Layer-2

ERserver. iseries. Remote Access Services: PPP connections

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

IP interconnect interface for SIP/SIP-I

MPLS and IPSec A Misunderstood Relationship

Connecting Remote Users to Your Network with Windows Server 2003

AN OVERVIEW OF REMOTE ACCESS VPNS: ARCHITECTURE AND EFFICIENT INSTALLATION

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Virtual Private Networks Solutions for Secure Remote Access. White Paper

Communication Networks. MAP-TELE 2011/12 José Ruela

MPLS is the enabling technology for the New Broadband (IP) Public Network

Introduction to TCP/IP

co Sample Configurations for Cisco 7200 Broadband Aggreg

2. IP Networks, IP Hosts and IP Ports

Master Course Computer Networks IN2097

ISTANBUL. 1.1 MPLS overview. Alcatel Certified Business Network Specialist Part 2

Layer 3 MPLS VPN Enterprise Consumer Guide Version 2

RA-MPLS VPN Services. Kapil Kumar Network Planning & Engineering Data. Kapil.Kumar@relianceinfo.com

Lecture 17 - Network Security

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

MPLS Concepts. Overview. Objectives

Networked AV Systems Pretest

Introducing Basic MPLS Concepts

Quidway MPLS VPN Solution for Financial Networks

DYNAMIC MULTIPOINT VPN HUB AND SPOKE INTRODUCTION

Chapter 2 - The TCP/IP and OSI Networking Models

AT&T Managed IP Network Service (MIPNS) MPLS Private Network Transport Technical Configuration Guide Version 1.0

This chapter describes how to set up and manage VPN service in Mac OS X Server.

IP Office Virtual Private Networking

CTS2134 Introduction to Networking. Module 07: Wide Area Networks

Guideline for setting up a functional VPN

Application Note: Onsight Device VPN Configuration V1.1

ProCurve Networking IPv6 The Next Generation of Networking

Transcription:

Virtual Private Networks (VPN) VPN Virtual Private Networks Introduction VPDN Details (L2F, PPTP, L2TP) old idea private networks of different customers can share a single WAN infrastructure since 1980 s public switched data networks (PSDN) were offered by providers (e.g. PTTs) to give open access to subscribers of a PSDN to interconnect parts of a physically separated private network do you remember closed user group of X.25 closed user group of PVC-DLCI s of Frame relay PVC-VPI/VCI s of ATM private subnetwork (customer gateway) and public MAN service (edge gateway) of MAN -> closed user group of MAN (Metropolitan Area Network based on 802.6 DQDB) VPN Intro + VPDN, v4.3 3 Agenda VPN Classical Approach Overview IP Based Solutions IP addresses non overlapping IP addresses overlapping MPLS-VPN VPDN RAS Primer and VPN Dialup Issues L2F PPTP L2TP VPN Intro + VPDN, v4.3 2 Classical VPN s X.25, Frame Relay or ATM in the core dedicated physical switch ports for every customers C router, bridge, computer customer traffic separation in the core done by concept of virtual circuit PVC service management overhead SVC service with closed user group feature signaling overhead separation of customers inherent to virtual circuit technique privacy is aspect of customer in most cases overlooked VPN s based on Overlay Model VPN Intro + VPDN, v4.3 4 Page 84-1 Page 84-2

Physical Topology of Classical VPN Logical Topology Classic VPN (2) Location A0 Location B0 Location A0 Location B0 Full Mesh WAN Switches Location B3 Location B3 Location A1 Location A3 Location A1 Location A3 Location B1 Location A2 Location B2 VPN Intro + VPDN, v4.3 5 Location B1 Location A2 Location B2 VPN Intro + VPDN, v4.3 7 Logical Topology Classic VPN (1) Location A1 Location A0 Location B1 Location A2 Location B2 Location B0 Location A3 Hub and Spoke Partial Mesh Location B3 VPN Intro + VPDN, v4.3 6 Agenda VPN Classical Approach Overview IP Based Solutions IP addresses non overlapping IP addresses overlapping MPLS-VPN VPDN RAS Primer and VPN Dialup Issues L2F PPTP L2TP VPN Intro + VPDN, v4.3 8 Page 84-3 Page 84-4

Virtual Private Networks based on IP single technology end-to-end IP forwarding and IP routing no WAN switches in the core based on different technology (X.25, FR or ATM) administered by different management techniques but accounting and quality of service just coming in the IP world X.25, FR and ATM have it already often private means cases control over separation but not privacy data are seen in clear-text in the core encryption techniques can solve this problem but encryption means must be in the hand of the customer VPN s based on Peer Model VPN Intro + VPDN, v4.3 9 Possible Solutions for IP VPN s IP addresses of customers non overlapping filtering and policy routing techniques can be used in order to guarantee separation of IP traffic exact technique depends on who manages routes at the customer site IP addresses of customers overlapping tunneling techniques must be used in order to guarantee separation of IP traffic GRE L2F, PPTP, L2TP MPLS-VPN If privacy is a topic encryption techniques must be used SSL/TLS, IPsec VPN Intro + VPDN, v4.3 11 Physical Topology IP VPN Location A1 Location A0 Location B1 Core Router P Location A2 Location B2 Location B0 Customer Edge Provider Edge Location A3 Location B3 VPN Intro + VPDN, v4.3 10 Tunneling Solutions for IP VPN s Tunneling techniques are used in order to guarantee separation of IP traffic IP in IP Tunneling or GRE (Generic Routing Encapsulations) Bad performance on router PPTP or L2TP for LAN to LAN interconnection Originally designed for PPP Dial-up connections LAN LAN is just a special case MPLS-VPN Best performance on router In all these cases Privacy still an aspect of the customer VPN Intro + VPDN, v4.3 12 Page 84-5 Page 84-6

Tunneling IP VPNs without Encryption Tunneling IP VPNs without Encryption Company A Company A Company A Company A Company A Company A Company A Company A Virtual Private Network (VPN) (tunneling between customer edge routers e.g. GRE) Virtual Private Network (VPN) (encryption between customer edge routers or border firewalls e.g. IPsec) Company A Virtual Private Network (VPN) (tunneling between routers of provider e.g. MPLS VPN) VPN Intro + VPDN, v4.3 13 Virtual Private Network (VPN) (encryption between IP hosts e.g. SSL/TLS, IPsec) VPN Intro + VPDN, v4.3 15 Encryption Solutions for IP VPN s If privacy is a topic tunneling techniques with encryption are used in order to hide IP traffic SSL (secure socket layer) Usually end-to-end Between TCP and Application Layer IPsec Could be end-to-end Could be between special network components (e.g. firewalls, VPN concentrators) only Between IP and TCP/UDP Layer PPTP and L2TP Tunnels With encryption turned on via PPP option SSL/TLS versus IPsec Application must be aware of new application programming interface new API Application SSL / TLS TCP IP Lower Layers Application OS Application can use standard application programming interface Application TCP IPsec IP standard API Lower Layers VPN Intro + VPDN, v4.3 14 VPN Intro + VPDN, v4.3 16 Page 84-7 Page 84-8

Agenda VPN Classical Approach Overview IP Based Solutions IP addresses non overlapping IP addresses overlapping MPLS-VPN VPDN RAS Primer and VPN Dialup Issues L2F PPTP L2TP VPN Intro + VPDN, v4.3 17 IP Addressing non overlapping (1) one IP address space in the core and at the customer sites one routing domain dynamic routing protocols in the core transport network information about all customer networks and all core networks challenge for the provider to give every customer only network information about own networks to discard packets with wrong destination address coming from a given customer several ways to achieve depending on the control of the routers at the customer site VPN Intro + VPDN, v4.3 19 Physical Topology IP VPN IP Addressing non overlapping (2) Location A0 Location B0 176.16.1.0 176.17.1.0 Customer Edge Provider Edge Core Nodes CN Location B3 176.17.4.0 Location A1 Location A3 176.16.2.0 176.16.4.0 Location B1 Location A2 Location B2 VPN Intro + VPDN, v4.3 18 176.17.2.0 176.16.3.0 176.17.3.0 VPN Intro + VPDN, v4.3 20 Page 84-9 Page 84-10

IP Addressing non overlapping (3) Routers under different control (2) Routing Table 176.16.1.0-176.16.4.0 176.16.1.0 Routing Table Core 176.16.1.0-176.16.4.0 176.17.1.0-176.17.4.0 176.17.1.0 Routing Table 176.17.1.0-176.17.4.0 176.17.4.0 router controlled by provider: routing: dynamic routing in the core static routing to the customer with route redistribution of static routes into the core or dynamic routing with route filtering to the customer data packet filtering: incoming packets concerning source and destination address 176.16.2.0 176.17.2.0 176.16.3.0 176.17.3.0 176.16.4.0 VPN Intro + VPDN, v4.3 21 static routes / dynamic routing with route filtering and data packet filtering means big administrative overhead at the provider site and have performance impacts on routers VPN Intro + VPDN, v4.3 23 Routers under different control (1) router controlled by customer: routing: static routing to the core or dynamic routing to the core (no default route) data packet filtering: (incoming packets concerning source and destination address) ( ) can be done because of security reasons static routes and data packet filtering means administrative overhead at the customer site default routing problem e.g. for connectivity must be solved by tunneling All routers under provider control (1) router at the customer site: routing: dynamic routing to the core no default route router routing: dynamic routing in the core dynamic routing with route filtering to the customer for the provider less administrative overhead than routers under different control VPN Intro + VPDN, v4.3 22 VPN Intro + VPDN, v4.3 24 Page 84-11 Page 84-12

All routers under provider control (2) special case if two customers are merged at the customer edge and not at the distribution or core area this router needs full information about all networks in order to forward packets to all destinations therefore separation of customers based on different routing tables is not possible hence data packet filtering is necessary based on incoming packets concerning source and destination address IP Addressing overlapping (1) separated IP address spaces in the core and at the customer sites needs either NAT at solutions are the same as with non overlapping addresses or different routing domains dynamic routing protocols in the core are independent from dynamic routing protocols of the customer networks challenge for the provider to separate routing domains several ways to achieve depending on the control of the routers at the customer site VPN Intro + VPDN, v4.3 25 VPN Intro + VPDN, v4.3 27 Agenda VPN Classical Approach Overview IP Based Solutions IP addresses non overlapping IP addresses overlapping MPLS-VPN VPDN RAS Primer and VPN Dialup Issues L2F PPTP L2TP VPN Intro + VPDN, v4.3 26 IP Addressing overlapping (2) 176.16.2.0 176.16.1.0 176.16.2.0 176.16.3.0 176.16.3.0 176.16.1.0 176.16.4.0 176.16.4.0 VPN Intro + VPDN, v4.3 28 Page 84-13 Page 84-14

IP Addressing overlapping Scenario 1 176.16.2.0 176.16.1.0 176.16.2.0 176.16.3.0 176.16.3.0 176.16.1.0 Tunnel for 176.16.4.0 176.16.4.0 Tunnel for VPN Intro + VPDN, v4.3 29 Routers under different control (2) routers controlled by provider: dynamic routing in the core for knowing about tunnelendpoints ip policy routing traffic from a given interface can be forwarded only to certain tunnels depending on the destination address a next hop is set next hop points to a specific tunnel for unknown destinations next hop is set to null0 interface these packets are discarded tunneling and ip policy routing administrative overhead at the provider site performance and scalability impacts VPN Intro + VPDN, v4.3 31 Routers under different control (1) IP Addressing overlapping Scenario 2 routers controlled by customer: routing: static routing to the core or dynamic routing to the core data packet filtering can be done because of security reasons incoming packets concerning source and destination address default routing e.g. for connectivity can be solved in accordance with the provider by a special tunnel to the exit point 176.16.2.0 176.16.1.0 176.16.1.0 Tunnel for 176.16.4.0 176.16.4.0 VPN Intro + VPDN, v4.3 30 176.16.2.0 176.16.3.0 176.16.3.0 Tunnel for VPN Intro + VPDN, v4.3 32 Page 84-15 Page 84-16

All routers under provider control Result: Routing Domain for routers at the customer site: routing: dynamic routing to the core for knowing about tunnel-endpoints static routes to all customer destinations to find the right tunnel or dynamic routing to all customer destinations second dynamic routing process information is not given to the core routers dynamic routing in the core will not see customer networks Routing Domain Core Routing Domain 176.16.1.0 176.16.4.0 VPN Intro + VPDN, v4.3 33 176.16.2.0 176.16.3.0 VPN Intro + VPDN, v4.3 35 Result: Routing Domain for Agenda 176.16.2.0 176.16.1.0 Core Routing Domain Routing Domain 176.16.4.0 VPN Classical Approach Overview IP Based Solutions IP addresses non overlapping IP addresses overlapping MPLS-VPN VPDN RAS Primer and VPN Dialup Issues L2F PPTP L2TP 176.16.3.0 VPN Intro + VPDN, v4.3 34 VPN Intro + VPDN, v4.3 36 Page 84-17 Page 84-18

MPLS-VPN 176.16.2.0 176.16.1.0 IP Network with MPLS-Switching plus MPLS- Application VPN 176.16.2.0 176.16.3.0 176.16.3.0 176.16.1.0 MPLS-Path (= Tunnel) for 176.16.4.0 176.16.4.0 MPLS-Path (= Tunnel) for VPN Intro + VPDN, v4.3 37 What does MPLS VPN mean for the Provider? Requires MPLS Transport within the core Using the label stack feature of MPLS Requires MP-BGP among routers Supports IPv4/v6, VPN-IPv4, multicast Default behavior: BGP-4 Requires VPN-IPv4 96 bit addresses 64 bit Route Distinguisher (RD) 32 bit IP address Every router uses one VRF for each VPN Virtual Routing and Forwarding Table (VRF) VPN Intro + VPDN, v4.3 39 MPLS VPN Best of Both Worlds Combines VPN Overlay model with VPN Peer model routers allow route isolation By using Virtual Routing and Forwarding Tables (VRF) for differentiating routes from the customers Allows overlapping address spaces routers participate in P-routing Hence optimum routing between sites Label Switches Paths are used within the core network Easy provisioning (sites only) Overlapping VPNs possible By a simple (?) attribute syntax Agenda VPN Classical Approach Overview IP Based Solutions IP addresses non overlapping IP addresses overlapping MPLS-VPN VPDN RAS Primer and VPN Dialup Issues L2F PPTP L2TP VPN Intro + VPDN, v4.3 38 VPN Intro + VPDN, v4.3 40 Page 84-19 Page 84-20

most of today s company networks are based on one or more of protocol techniques like IP, IPX, NetBios, AppleTalk, etc private addresses several network access principles constant connectivity router/switches/leased lines dial on demand connectivity access server/security server/-pstn if network technology and network applications of a company network are based on TCP/IP protocol suite we call such a network INTRANET VPN Intro + VPDN, v4.3 41 RAS techniques for s lets talk about remote access techniques first functionality handled by remote clients, access server and security server PPP protocol (RFC 1661, 1662) PPP authentication methods CHAP (RFC 1994) PAP (RFC 1334) these basic techniques are used by and s encryption methods end-to-end (IPsec; RFC 1825-1829) end-to-access server (PPP encryption; draft-ietf-pppext-desencrypt-v2-00.txt, RFC 1968, 2419, 2420) in both cases remote PC must deal with encryption in order to achieve privacy! VPN Intro + VPDN, v4.3 43 RAS Operation 1 WWW E-Mail Name remote PC places call to access server, link is established (1) 1) /PSTN VPN Intro + VPDN, v4.3 42 VPN Intro + VPDN, v4.3 44 Page 84-21 Page 84-22

RAS Operation 2 RAS Operation 4 2c) 2a), 2b) PPP link (multiprotocol over serial line) is established LCP (2a) authentication CHAP (2b) verification done by central security server (2c) 4a) 4b) privacy on PPP encryption between remote PC and access server (4a) privacy end-to-end IPsec efforts based on additional encryption header between IP and higher layers (4b) VPN Intro + VPDN, v4.3 45 VPN Intro + VPDN, v4.3 47 RAS Operation 3 3) virtual interface PPP NCP assigns IP address to remote PC remote PC appears as device reachable via virtual interface (3) optionally filter could be established on that virtual interface authorization accounting can be performed actually done by security server (AAA server) TACACS, TACACS+ Radius access to the : firewall to secure against hacker attacks firewall to provide necessary connectivity for communication between hosts and other hosts located in the address translation to map certain private addresses to official IP addresses and vice versa NAT network address translation gateway firewall and NAT could be one box but firewalls do not replace end system security can compensate some weaknesses of end systems VPN Intro + VPDN, v4.3 46 VPN Intro + VPDN, v4.3 48 Page 84-23 Page 84-24

to VPN Purpose Customer connectivity deployed on a shared infrastructure with the same policies as a private network Addr. Transl. SP Shared Network, IP, FR, ATM VPN VPN Intro + VPDN, v4.3 49 VPN Intro + VPDN, v4.3 51 A Possible Architecture IP VPN Technologies private IP addresses Packet Level WWW SMTP DNS Two major IP VPN implementations Peer to Peer VPN, Service provider takes part in customer routing e.g. MPLS Overlay VPN based on IP infrastructure, uses additional encapsulation technique to simulate virtual point to point connections between customer sites e.g. GRE, IPSEC, L2TP, PPTP, etc demilitarized zone official IP addresses /PSTN Packet Level INTERNET Bastion Host (Application Level ) VPN Intro + VPDN, v4.3 50 VPN Intro + VPDN, v4.3 52 Page 84-25 Page 84-26

VPDN Terminology VPDN Virtual Private Dial-up Networks When L2TP, L2F or PPTP are used to establish a virtual private connection accross remote access (dial-up) networks VPN in a Dial-Up Environment what is really new with VPN and? we have to look to the remote access part of a company s costs of long distance calls aspects of administration and security user convenience remote access is one of the fastest growing areas of information technology mobility home office costs of telephone circuits answer: VPN in a dial up scenario -> VPDN VPN Intro + VPDN, v4.3 53 VPN Intro + VPDN, v4.3 55 VPDN Overview Dial up Scenario Remote Home Lan Home Gateway Addr. Transl. POP Remote User Cloud PSTN Remote User /PSTN short distance call official IP address long distance call private IP address /PSTN VPN Intro + VPDN, v4.3 54 VPN Intro + VPDN, v4.3 56 Page 84-27 Page 84-28

VPDN Challenge User Aspects VPN and Dial Up POP short distance call with private IP address /PSTN VPDN between remote host and home-gateway Addr. Transl. /PSTN basic idea of VPN in a dial up environment extension of local PPP sessions between remote client and to the native entry point of the (access server) this is done by encapsulation of PPP packets into IP several methods developed and deployed L2F Layer Two Forwarding Protocol (Cisco; RFC 2341) PPTP Point-to-Point Tunneling Protocol (Microsoft; RFC 2637) finally efforts to combine these proposals lead in L2TP Layer Two Tunneling Protocol (RFC 2661) VPN Intro + VPDN, v4.3 57 VPN Intro + VPDN, v4.3 59 VPDN Challenge Provider Aspects Layer 2 Overlay VPN Technologies POP short distance call to relieve of data circuits packet switching (statistical multiplexing) /PSTN of Provider X circuit switching (synchronous multiplexing) Addr. Transl. Layer 2 Tunnel Protocol (L2TP) IP PPP Layer 2 Forwarding Protocol (L2F Protocol) IP Point-to-Point Tunnelling Protocol (PPTP) Used to transport PPP frames across a shared infrastructure, to simulate virtual point to point connections VPN Intro + VPDN, v4.3 58 VPN Intro + VPDN, v4.3 60 Page 84-29 Page 84-30

PPP extension L2F Overview POP Addr. Transl. Protocol, created by Cisco Not a Standard Defined in RFC 2341, May 1998 Tunnelling of the Link Layer over Higher layer Protocols short distance call /PSTN PPP session between remote host and home-gateway /PSTN virtual interface VPN Intro + VPDN, v4.3 61 VPN Intro + VPDN, v4.3 63 Agenda VPN Classical Approach Overview IP Based Solutions IP addresses non overlapping IP addresses overlapping VPDN RAS Primer and VPN Dialup Issues L2F PPTP L2TP VPN Intro + VPDN, v4.3 62 L2F POP remote-pc 3) 1), 2) L2F Tunnel 4) home-gateway NAT 1) short distance call 2) PPP session setup between remote-pc and access server of 3) username of CHAP used for mapping user to its VPDN (IP address of home-gateway) 4) L2F Tunnel established between access server and home-gateway VPN Intro + VPDN, v4.3 64 Page 84-31 Page 84-32

L2F L2F Encapsulation POP remote-pc 7) 5) L2F Tunnel home-gateway 6) NAT 5) encapsulation of all traffic from remote-pc into L2F Tunnel an vice versa 6) CHAP (authentication) proceeded between remote-pc and of home-gateway (security server) 7) assignment of IP address out of the pool of private addresses VPN Intro + VPDN, v4.3 65 remaining IP Header remaining IP Header PPP Header source address destination address private IP addr. remote-pc L2F Header official IP addr. access server private IP addr. remote IP host PPP Payload remote IP host home-gateway L2F Payload IP Payload access server home-gateway official IP addr. home-gateway UDP Header access server NAT-gateway UDP Payload VPN Intro + VPDN, v4.3 67 L2F L2F Facts 3) NAT provider must know the home-gateway of a certain user POP 8) provider must establish and maintain L2F tunnel different remote-clients are distinguished by Multiplex ID remote-pc 9) home-gateway 8) PPP session end-to-end 9) remote-pc becomes part of private authentication CHAP between and home-gateway and vice versa may be used optionally during tunnel establishment to handle spoofing attacks privacy (encryption) not handled by L2F!!!! VPN Intro + VPDN, v4.3 66 remote PC must know about number of local POP remote PC becomes part of private VPN Intro + VPDN, v4.3 68 Page 84-33 Page 84-34

L2F Facts NAT and firewall must allow communication between access server and home-gateway L2F supports incoming calls only end system transparency neither the remote end system nor its home-site servers requires any special software to use this service PPTP Overview Created by a Vendor Consortium US-Robotics, Microsoft, 3COM, Ascend and ECI Telematics Supports multiprotocol VPNs with 40 and 128-bit encryption using Microsoft Point-to-Point Encryption (MP) Not a Standard RFC 2637,July 1999 Tunnelling of PPP over IP network A Client-Sever Architecture VPN Intro + VPDN, v4.3 69 VPN Intro + VPDN, v4.3 71 Agenda VPN Classical Approach Overview IP Based Solutions IP addresses non overlapping IP addresses overlapping VPDN RAS Primer and VPN Dialup Issues L2F PPTP L2TP VPN Intro + VPDN, v4.3 70 PPTP POP remote-pc 3) 4), 5) 1), 2) home-gateway NAT 1) short distance call 2) PPP session setup between remote-pc and access server of 3) username and challenge of CHAP used for user authentication 4) official IP address assigned by for remote-pc 5) PPP session fully established between remote-pc and access server VPN Intro + VPDN, v4.3 72 Page 84-35 Page 84-36

PPTP PPTP and NAT NAT POP PPTP access concentrator (PAC) PPTP Tunnel 6) PPTP network server (PNS) 7) 6) PPTP Tunnel established between PAC and PNS 7) authentication performed between PAC and PNS (security server) VPN Intro + VPDN, v4.3 73 POP remote-pc PPP Link PPTP Tunnel PPTP access concentrator (PAC) (Microsoft calls this function FEP) home-gateway VPN Intro + VPDN, v4.3 75 PPTP PPTP Encapsulation Data POP PPTP access concentrator (PAC) 10) PPTP Tunnel PPTP network server (PNS) VPN Intro + VPDN, v4.3 74 8) 9) NAT 8) PPTP control messages are carried on top of a TCP session between PAC and PNS (responsible for call setup and tear down Call ID) 9) PPTP data messages contains PPP encapsulated in IP & enhanced GRE 10) private address must be assigned additionally by PNS to allow PAC to join the contains Call-ID remaining IP Header remaining IP Header PPP Header source address destination address private IP addr. PAC GRE Header official IP addr. PAC private IP addr. PAC PAC PNS official IP addr. PNS PPP Payload GRE Payload PAC PNS PAC NAT-gateway IP Payload IP Payload VPN Intro + VPDN, v4.3 76 Page 84-37 Page 84-38

PPTP Encapsulation Control PPTP Control Message PPTP Facts PPTP can be used for direct LAN-to-LAN connectivity without Dial on Demand Microsoft VPN TCP Header TCP Payload PAC PNS-gateway encryption may be performed on PPTP data tunnel end-to-end (PAC to PNS) remaining IP Header official IP addr. PAC official IP addr. PNS PAC NAT-gateway IP Payload end system transparency is not given if remote-pc performs function of a PAC VPN Intro + VPDN, v4.3 77 VPN Intro + VPDN, v4.3 79 PPTP Facts remote PC must know about number of local POP and will be assigned a official IP address private addresses are used message-internal to reach server NAT and must allow communication between any PAC and PNS that means more overhead than L2F at NAT and Agenda VPN Classical Approach Overview IP Based Solutions IP addresses non overlapping IP addresses overlapping VPDN RAS Primer and VPN Dialup Issues L2F PPTP L2TP PPTP may be used for incoming and outgoing calls VPN Intro + VPDN, v4.3 78 VPN Intro + VPDN, v4.3 80 Page 84-39 Page 84-40

L2TP Overview Protocol developed by the PPTP forum, Cisco and the IETF A Proposed Standard Defined in RFC 2661, August 1999 Transparent Tunnelling of PPP over Intervening Network Supports IPSec encryption L2TP control messages and payload messages operates over a given tunnel in parallel L2TF will be encapsulated in UDP or mapped to PVC or SVC control messages are carried reliable retransmission based on sequence numbers AVP (attribute value pairs) technique is used for control message format CALL-ID used for multiplexing of different calls over the same tunnel control messages can be sent in a secure way using MD5 hash as kind of digital signature tunnel peers must be authenticated by additional CHAP procedure between LNS and LAC before VPN Intro + VPDN, v4.3 81 VPN Intro + VPDN, v4.3 83 L2TP follows the basic ideas of L2F end system transparency only private address at remote-pc assigned adapts PAC / PNS terminology and concept of Control / Data messages of PPTP LAC = L2TP Concentrator access server LNS = L2TP Network home-gateway call establishment (assignment of CALL-ID), call management and call tear-down procedures sounds a little bit like Signaling Q.931 VPN Intro + VPDN, v4.3 82 L2TP different tunnels may be used between a given LAC / LNS pair for implementing different QoS for different users optionally flow control techniques can be implemented to perform congestion control over the tunnel support of accounting at LNS and LAC site can be used for incoming and outgoing calls integrity of payload messages not covered by L2TP still an end-to-end issue VPN Intro + VPDN, v4.3 84 Page 84-41 Page 84-42

L2TP L2TP devices POP L2TP access concentrator (LAC) 7) 5) L2TP Tunnel L2TP network outgoing and incoming server (LNS) calls allowed (more sophisticated call management) NAT L2TP Network (LNS) The LNS is the logical termination point of a PPP session that is tunnelled from a remote system using L2TP encapsulation L2TP Concentrator (LAC) Is a L2TP peer to the LNS A LAC process could be run on a NAS or on a client PC itself Network (NAS) Provides network access to users across a remote access network e.g. PSTN remote-pc PPP Traffic (remote-pc becomes part of private address space of ) VPN Intro + VPDN, v4.3 85 VPN Intro + VPDN, v4.3 87 L2TP Terminology L2TP Overview Layer2 Multiprotocol Transport Home LAN LNS IP WS IP WS L2TP tunnel Remote System LAC L2TP Tunnel Switch Cloud NAS PSTN LAC Client IPX Client AppleTalk Client POP L2TP Tunnel Home Gateway VPN Intro + VPDN, v4.3 86 VPN Intro + VPDN, v4.3 88 Page 84-43 Page 84-44

L2TP Tunnel Possibilities 1 L2TP Messages Types Home Lan L2TP Tunnel Remote@company.at LNS L2TP utilizes two types of messages Control Messages Used for the establishment, maintenance and clearing of L2TP tunnels Are transported across a reliable control channel Data Messages In L2TP encapsulated PPP frames Are not retransmitted when a packet loss occurs Remote User LAC Cloud NAS PSTN LAC Client VPN Intro + VPDN, v4.3 89 VPN Intro + VPDN, v4.3 91 L2TP Tunnel Possibilities 2 L2TP Structure Home Lan LNS PPP Frames Remote User L2TP Tunnel Remote@company.at LAC Cloud L2TP Tunnel NAS PSTN Account to a public LAC Client L2TP Data Messages L2TP Data Channel (unreliable) L2TP Control Messages L2TP Control Channel (reliable) Packet Transport (UDP, FR, ATM, etc.) VPN Intro + VPDN, v4.3 90 VPN Intro + VPDN, v4.3 92 Page 84-45 Page 84-46

L2TP Header Format 1 8 16 T L X X S X O P X X X X Ver Length (optional) Tunnel ID Session ID Ns (optional) Nr (optional) Offset Size (optional) Offset padding... (variable, optional) VPN Intro + VPDN, v4.3 93 L2TP Header Fields Length field Indicates the total length of the message in bytes Tunnel ID Identifier for Control Connection Only Locally Significant Session ID Identifier for Session in the Tunnel Only Locally Significant Nr Sequence Number Used to Acknowledge received control messages Ns Sequence Number Send Sequence number of actual control message Offset Field Indicates the start of the payload data VPN Intro + VPDN, v4.3 95 L2TP Control Bits Type (T) bit Indicates type of message 0 = data message, 1 = control message Length (L) bit L = 1 means length field present, must be set to 1 in control messages X bits Are reserved for future use Sequence (S) bit S = 1 indicate the presence of the Nr and Ns counters, must be 1 in control messages Offset (O) bit O = 1 indicate the presence of the offset field, must be 0 in control messages Priority (P) bit P = 1 indicates preferential treatment, typically used in data messages Types of Control Messages Control Connection Management 0 Reserved 1 2 3 4 SCCRQ SCCRP SCCCN StopCCN Start-Control-Connection-Request Start-Control-Connection-Reply Start-Control-Connection-Connected Stop-Control-Connection-Notification 5 Reserved 6 HELLO Hello VPN Intro + VPDN, v4.3 94 VPN Intro + VPDN, v4.3 96 Page 84-47 Page 84-48

Types of Control Messages AVP Format Call Management 7 OCRQ Outgoing-Call-Request 8 9 10 11 12 OCRP OCCN ICRQ ICRP ICCN Outgoing-Call-Reply Outgoing-Call-Connected Incoming-Call-Request Incoming-Call-Reply Incoming-Call-Connected 13 Reserved 14 CDN Call-Disconnect-Notify 1 8 16 M H Reserved (4) Length (10) Vendor ID Attribute Type Attribute Value... (variable till length is reached) 15 16 WEN SLI Error Reporting WAN-Error-Notify PPP Session Control Set-Link-Info VPN Intro + VPDN, v4.3 97 VPN Intro + VPDN, v4.3 99 AVP Control Message extensions AVP Attribute Value Pair Used to exchange and negotiate more detailed L2TP session related information e.g. Window size, Host names, call serial number etc. Uniform method for encoding message types and payload Several Well Known AVPs are defined AVP Bits Mandatory (M) bit Controls the Behaviour for Unrecognized AVPs Hidden (H) bit Responsible for Hiding Data of AVP Length field Defines the Number of Octets in AVP Vendor ID ID = 0 indicates IETF standardized AVP types VPN Intro + VPDN, v4.3 98 VPN Intro + VPDN, v4.3 100 Page 84-49 Page 84-50

Some of Well Known AVPs Control Connection Setup Message Type Random Vector Result Code Protocol Version Framing Capabilities Bearer Capabilities Bearer Type Tie Breaker Firmware Revision Host Name Vendor Name Assigned Tunnel ID Receive Window Size Challenge Challenge Response Q.931 Cause Code Assigned Session ID Call Serial Number Min and Max BPS Framing Type Caller Number Calling Number User PSTN or LAC or LNS SCCRQ SCCRP SCCN ZLB ACK LNS or LAC Home LAN VPN Intro + VPDN, v4.3 101 VPN Intro + VPDN, v4.3 103 L2TP Operation PSTN or User LAC LNS Home LAN L2TP Tunnel Control Connection IP PPP Call PPP L2TP Session PPP L2TP Tunnel Authentication Similar to CHAP Optional Using a Challenge AVP Included in SCCRQ or SCCRP Messages A Single Shared Password VPN Intro + VPDN, v4.3 102 VPN Intro + VPDN, v4.3 104 Page 84-51 Page 84-52

L2TP Incoming Call Disconnecting a Session PSTN or User LAC LNS Home LAN User Calls in ICRQ ICRP User PSTN or LAC or LNS CDN (Clean up) LNS or LAC Home LAN ICCN ZLB ACK ZLB ACK (Clean up) VPN Intro + VPDN, v4.3 105 VPN Intro + VPDN, v4.3 107 Forwarding of PPP Frames ppp PSTN or User LAC LNS Home LAN L2TP Tunnel Virtual interface Control Connection IP PPP Call PPP L2TP Session PPP L2TP over UDP/IP Using UDP Port 1701 Might be Changed by LAC or LNS, Could Cause a Problem for NAT IP Fragmentation May be Involved LCP Could negotiate MRU Recommended to Use UDP Checksum VPN Intro + VPDN, v4.3 106 VPN Intro + VPDN, v4.3 108 Page 84-53 Page 84-54

L2TP Tunnel Endpoint Optional, Performed by LAC and LNS Packet Level the lower layer uses encryption End to End Using a Secure Transport L2TP and IPsec IPsec is in charge of packet level security (RFC 3193) VPN Intro + VPDN, v4.3 109 Page 84-55