View
245
Download
1
Embed Size (px)
Citation preview
A Performance Analysis of Gateway-to-Gateway and End-to-Gateway
L2TP VPN
Author:
Rukhsana Rahim Butt
Dec, 2006 COMSATS Institue of Information Technology
2
Abstract
• L2TP Communication Modes behave differently on real and non-real applications.
• Detailed analysis for administrator is needed prior to VPN Mode deployment.
• This study can be beneficial for – Financial growth.– Saving bandwidth.– Client satisfaction.
Dec, 2006 COMSATS Institue of Information Technology
3
Paper Overview
• Paper Goal– Provide basic understanding of communication
Modes , current development and missing aspects/loopholes.
– Effect of these technologies’ on various applications.– How these technologies fit together to provide
today’s VPN solutions.
• Approach– Simulation of L2TP Tunnel and measurement of
capacity using OPNET
Dec, 2006 COMSATS Institue of Information Technology
4
What and Why?
VPNs
Provider Provisioned
VPNs
Customer Provisioned
VPNs
Site-to-SiteRemote Access
Remote Access
Site-to-Site
Compulsory Tunnel
Voluntary Tunnel
L2F PPTP L2TPv2/v3 PPTPL2TPv2/v3 IPSec SSL/TLS
Dec, 2006 COMSATS Institue of Information Technology
5
How L2TP/IPSec Secure WLAN?
• Strong encryption, integrity, user authentication, replay protection, tunnel address assignment, multi-protocol and multi-vendor interoperability.
• Mitigate attacks like – Wireless Packet Sniffer– Unauthorized Access– Network Topology Discovery– Password Attack
Dec, 2006 COMSATS Institue of Information Technology
6
L2TP Communication Modes
• Gateway-to-Gateway Mode– Compulsory Tunnel
• End-to-Gateway Mode– Voluntary Tunnel
H o st
S u b scr ib er
N A S
L A C L N S
G a tew a y C o rp o ra te N etw ork
In tern et C lou d
L 2 T P Tu n n e l
P P P S essio n
H o st
S u b scr ib er
N A S G a tew a y C o rp o ra te N etw o rk
In tern et C lo u d
L 2 T P Tu n n e l
P P P S essio nw ith
IP S ec Tu n n e lo r
L A C o n h o stL N S o n g a tew a y
Dec, 2006 COMSATS Institue of Information Technology
7
L A N R eso u rces
C lien t
C lien t
M o b ile C lien t
E th ern et
V P N S erv er
V P N S erv er /R o u ter
C o m p u lso ry Tu n n el
Vo lu n ta ry Tu n n e l
In tern et
Voluntary Tunnel Vs Compulsory Tunnel
Dec, 2006 COMSATS Institue of Information Technology
8
Current Information
• General Tunnel Setup guideline
• Security breaches against Tunnels
• General Communication Mode Information
Dec, 2006 COMSATS Institue of Information Technology
9
What is Missing?
• Communication Modes’ Behavior vs. Applications– Analysis– Comparison– Suited Communication Mode against
Applications (real & non-real)
Dec, 2006 COMSATS Institue of Information Technology
10
Voice Received Traffic of Voluntary and Compulsory Tunnels (RFC 2764)
H o st
S u b scr ib er
N A S
L A C L N S
G a tew a y C o rp o ra te N etw o rk
In tern et C lo u d
L 2 T P Tu n n e l
P P P S essio n
H o st
S u b scr ib er
N A S G a tew a y C o rp o ra te N etw o rk
In tern et C lo u d
L 2 T P Tu n n e l
P P P S essio nw ith
IP S ec Tu n n e lo r
L A C o n h o stL N S o n g a tew a y
Voice Traffic Received Packets/Sec
0
50
100
150
200
250
300
350
400
0 180 360 540 720 900 1080 1260 1440 1620 1800
Time(Sec)
Pac
ket
CompulsoryTunnel
VoluntaryTunnel
Dec, 2006 COMSATS Institue of Information Technology
11
H o st
S u b scr ib er
N A S
L A C L N S
G a tew a y C o rp o ra te N etw o rk
In tern et C lo u d
L 2 T P Tu n n e l
P P P S essio n
H o st
S u b scr ib er
N A S G a tew a y C o rp o ra te N etw o rk
In tern et C lo u d
L 2 T P Tu n n e l
P P P S essio nw ith
IP S ec Tu n n e lo r
L A C o n h o stL N S o n g a tew a y
Voice Traffic Received Packets/Sec
0
50
100
150
200
250
300
350
400
0 180 360 540 720 900 1080 1260 1440 1620 1800
Time(Sec)
Pac
ket
CompulsoryTunnel
VoluntaryTunnel
Voice Received Traffic of Voluntary and Compulsory Tunnels (RFC 2764)
Dec, 2006 COMSATS Institue of Information Technology
12
Voice Throughput of Voluntary and Compulsory Tunnels (RFC 2764)
H o st
S u b scr ib er
N A S
L A C L N S
G a tew a y C o rp o ra te N etw o rk
In tern et C lo u d
L 2 T P Tu n n e l
P P P S essio n
H o st
S u b scr ib er
N A S G a tew a y C o rp o ra te N etw o rk
In tern et C lo u d
L 2 T P Tu n n e l
P P P S essio nw ith
IP S ec Tu n n e lo r
L A C o n h o stL N S o n g a tew a y
Total Throghput on PPP link
0
100
200
300
400
500
600
700
800
900
0 126 252 378 504 630 756 882 1008 1134 1260 1386 1512 1638 1764
Time(Sec)
Pac
ket
Compulsory Tunnel Voluntary Tunnel
Total Throughput on Tunnel Link
0
100
200
300
400
500
600
700
0 126 252 378 504 630 756 882 1008 1134 1260 1386 1512 1638 1764
Time(Sec)
Pac
ket
Compulsory Tunnel Voluntary Tunnel
Dec, 2006 COMSATS Institue of Information Technology
13
Requirements for Performance Analysis
High End-to-End Delay
Less Receiving Traffic Retrieved
Overall throughput decline on PPP and Tunnel links
Dec, 2006 COMSATS Institue of Information Technology
14
Why Gateway-to-Gateway communication mode not suited for Voice Application?
• Communication Mode is time-takenHigh End-to-End Delay
Less Receiving Traffic
• Tunnel SharingLess throughput on PPP Link
Less throughput on Tunnel Link
Dec, 2006 COMSATS Institue of Information Technology
15
Conclusion
The End-to-Gateway communication mode/ the Voluntary Tunnel of L2TP exposes
better response in case of real applications.
Dec, 2006 COMSATS Institue of Information Technology
16
Future Work
Quantitative Analysis of Wireless LAN Security and Performance via VPN
Technology L2TP/IPSec
Thanks
Any Question ?