VPN Seminar Report
VPN Seminar Report
ABSTRACT :
INTRODUCTION -
VPNs allow remote users to access private networks securely over the
Internet. A remote user in one part of the UK can establish a secure
network connection using a VPN to a school LAN in another part of
the UK and only incur the call cost for the local Internet connection
Our aims to address the topic of quality of service and the tools
available for designing a Virtual Private Network (VPN) with
appropriate service levels for mission critical applications.
What is a VPN?
A virtual private network gives secure access to LAN resources over a
shared network infrastructure such as the internet. It can be
conceptualised as creating a tunnel from one location to another, with
Encrypted data traveling through the tunnel before being decrypted at
its destination.
Remote users can connect to their organisation's LAN or any other
LAN. They can access resources such as email and documents as if
they were connected to the LAN as normal. By using VPN
technology it is possible to connect to a school LAN from anywhere
in the world via the internet, and to access it securely and privately
without incurring the large communication costs associated with other
solutions.
One user uses a 56 kilobits per second (Kbps) modem to dial their
internet service provider (ISP) and connects to the central LAN with
VPN software.
Private:
It means that the transmitted data is always kept confidential and
can only be accessed by authorised users. This is important because
the internet's original protocols –TCP/IP (transmission control
protocol/internet protocol) – were not designed to provide such
levels of privacy. Therefore, privacy must be provided by other
means such as additional VPN hardware or software.
Network:
It is the entire infrastructure between the endpoints of users, sites or
nodes that carries the data. It is created using the private, public,
wired, wireless, internet or any other appropriate network resource
available.
What types of VPN are there?
There are many variations of virtual private networks, with the
majority based on two main models:
Remote access:
(Virtual private dial-up network (VPDN) or client-to-site)
A remote access VPN is for home or travelling users who need to
access their central LAN from a remote location. They dial their ISP
and connect over the internet to the LAN. This is made possible by
installing a client software program on the remote user’s laptop or
PC that deals with the encryption and decryption of the VPN traffic
between itself and the VPN gateway on the central LAN.
Fixed:
(Intranet and extranet or site-to-site)
A fixed VPN is normally used between two or more sites allowing a
central LAN to be accessed by remote LANs over the internet or
private communication lines using VPN gateways. VPN gateways
(normally a VPN-enabled router) are placed at each remote site and
at the central site to allow all encryption and decryption and
tunneling to be carried out transparently.
QUALITY OF SERVICE
The Need for QoS:
Users of a widely scattered VPN do not usually care about the
network topology or the high level of security/encryption or firewalls
that handle their traffic. They don't care if the network implementers
have incorporated IPSec tunnels or GRE tunnels.
What they care about is something more fundamental, such as:
Do I get acceptable response times when I access my mission critical
applications from a remote office?
Acceptance levels for delays vary. While a user would be willing to
put up with a few additional seconds for a file transfer to complete,
the same user would have less tolerance for similar delays when
accessing a database or when running voice over an IP data network.
QoS aims to ensure that your mission critical traffic has acceptable
performance. In the real world where bandwidth is finite and diverse
applications from videoconferencing to ERP database lookups must
all vie for scarce resources, QoS becomes a vital tool to ensure that
all applications can coexist and function at acceptable levels of
performance.
VPN Implementation:
There are two methods for using VPNs to connect local area
networks at remote sites.
The solution must verify the user's identity and restrict VPN access to
authorized users only. In addition, the solution must provide audit and
accounting records to show who accessed what information when.
2. Address Management :
The solution must assign a clients address on the private net, and must
ensure that the private address are kept private.
3. Data encryption :
4. Key Management :
5.Tunelling :
Using tunneling can create a VPN. Tunneling is a Technology that
lets a network transport protocol carry information for other protocols
within its own packets.
Tunneling Technologies :
Tunneling Protocols :
Step 1.
The remote user dials into their local ISP and logs into the
ISP's network as usual.
Step 2.
When connectivity to the corporate network is desired, the user
initiates a tunnel request to the destination Security server on the
corporate network. The Security server authenticates the user and
creates the other end of tunnel.
Step 3.
The user then sends data through the tunnel, which encrypted by the
VPN software before being sent over the ISP connection.
Step 4.
The figure below illustrates that VPN software can be used from any
location through any existing ISP's dial-in service.
References:
www.infiworld.com
www.seminars.com
www.altavista.com