Please enable JavaScript.
Coggle requires JavaScript to display documents.
VPN and IPsec Concepts, Site-to-Site and Remote-Access VPNs, Enterprise…
VPN and IPsec Concepts
VPN Technology
Virtual Private Networks
A VPN is private in that the traffic is encrypted to keep the data confidential while it is transported across the public network.
A VPN is virtual in that it carries information within a private network, but that information is actually transported over a public network.
VPN Benefits
Security
VPNs provide the highest level of security available, by using advanced encryption and authentication protocols that protect data from unauthorized access.
Scalability
VPNs allow organizations to use the internet, making it easy to add new users without adding significant infrastructure.
Compatibility
VPNs can be implemented across a wide variety of WAN link options including all the popular broadband technologies. Remote workers can take advantage of these high-speed connections to gain secure access to their corporate networks.
Cost Savings
With the advent of cost-effective, high-bandwidth technologies, organizations can use VPNs to reduce their connectivity costs while simultaneously increasing remote connection bandwidth.
Types of VPNs
Remote-Access VPNs
Remote-access VPNs are typically enabled dynamically by the user when required. Remote access VPNs can be created using either IPsec or SSL. As shown in the figure, a remote user must initiate a remote access VPN connection.
SSL VPNs
Applications supported
- IPsec: Extensive - All IP-based applications are supported.
- SSL: Limited - Only web-based applications and file sharing are supported.
Authentication strength
- IPsec: Strong - Uses two-way authentication with shared keys or digital certificates.
- SSL: Moderate - Using one-way or two-way authentication.
Encryption strength
- IPsec: Strong - Uses key lengths from 56 bits to 256 bits.
- SSL: Moderate to strong - With key lengths from 40 bits to 256 bits.
Connection complexity
- IPsec: Medium - Because it requires a VPN client pre- installed on a host.
- SSL: Low - It only requires a web browser on a host.
Connection option
- IPsec: Limited - Only specific devices with specific configurations can connect.
- SSL: Extensive - Any device with a web browser can connect.
Site-to-Site IPsec VPNs
Site-to-site VPNs are used to connect networks across another untrusted network such as the internet. In a site-to-site VPN, end hosts send and receive normal unencrypted TCP/IP traffic through a VPN terminating device.
GRE over IPsec
is a non-secure site-to-site VPN tunneling protocol. It can encapsulate various network layer protocols. It also supports multicast and broadcast traffic which may be necessary if the organization requires routing protocols to operate over a VPN. However, GRE does not by default support encryption; and therefore, it does not provide a secure VPN tunnel.
Dynamic Multipoint VPNs
Dynamic Multipoint VPN (DMVPN) is a Cisco software solution for building multiple VPNs in an easy, dynamic, and scalable manner. Like other VPN types, DMVPN relies on IPsec to provide secure transport over public networks, such as the internet.
-
-
IPsec
IPsec Technologies
Is an IETF standard (RFC 2401-2412) that defines how a VPN can be secured across IP networks. IPsec protects and authenticates IP packets between source and destination. IPsec can protect traffic from Layer 4 through Layer 7.
-
Confidentiality
The degree of confidentiality depends on the encryption algorithm and the length of the key used in the encryption algorithm. If someone tries to hack the key through a brute-force attack, the number of possibilities to try is a function of the length of the key. The time to process all the possibilities is a function of the computer power of the attacking device.
Integrity
Data integrity means that the data that is received is exactly the same data that was sent. Potentially, data could be intercepted and modified. Because VPN data is transported over the public internet, a method of proving data integrity is required to guarantee that the content has not been altered.
Authentication
When conducting business long distance, you must know who is at the other end of the phone, email, or fax. The same is true of VPN networks. The device on the other end of the VPN tunnel must be authenticated before the communication path is considered secure.
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-