64
DECLARATION This is to certify that Thesis/Report entitled “VIRTUAL PRIVATE NETWORK” by me in partial fulfillment of the requirement for the award of degree B.Tech. in Computer Science And Engineering which is submitted to B------ V--------- College Of Engineering --------- University, comprises only my original work and due acknowledgement has been made in the text to all other material used. Date: Aug 2010 Rohit Thapliyal 1

DECLARATION - · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

Embed Size (px)

Citation preview

Page 1: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

DECLARATION

This is to certify that Thesis/Report entitled “VIRTUAL PRIVATE NETWORK” by me in partial fulfillment of the requirement for the award of degree B.Tech. in Computer Science And Engineering which is submitted to B------ V--------- College Of Engineering --------- University, comprises only my original work and due acknowledgement has been made in the text to all other material used.

Date: Aug 2010 Rohit Thapliyal

1

Page 2: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

ACKNOWLEDGEMENT

I would like to express my gratitude to all those who gave me the possibility to complete my summer training successfully. I want to thank the ----------- for giving me permission to commence this training and to do the necessary project work and also to gain some office experience. I have furthermore to thank Mrs. ---------------- Technical Director and his colleagues under whose supervision I underwent my training.

Very sincere thanks also to MR. ------------------- , my project guide at B-------- V--------------- COLLEGE OF ENGINEERING

I would also like to express my sincere thanks to Mr--------- (HOD, CSE Deptt.) and all the other involved faculty of the college.

2

Page 3: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

ABSTRACT

Students, staff and faculty increasingly connect to the campus data network via the Internet. The need to access university resources is likely to increase dramatically with the implementation of projects such as Sakai, and VPN services appear to offer solutions to related remote access requirements. Additionally, VPN services provide a secure method of improving remote access to licensed material and other university resources restricted to systems assigned a campus IP address. The workgroup examined available VPN technology and believes that SSL VPN solutions reflect a cost-effective and capable VPN solution for UC Davis. The workgroup recommends Information and Educational Technology prepare a Request for Information for an SSL VPN solution. As part of the RFI process, the workgroup further recommends that IET perform a pilot test using SSL VPN solution(s) that meet RFI specifications to ensure product conformity with our requirements for infrastructure and campus unit services and performance. The result of examination and successful testing should be a Request for Quote that permits a phased implementation based on campus size, but that does not make a commitment beyond an initial implementation level that includes current library proxy users and those users who are denied access to university resources due to network source address restrictions.

3

Page 4: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

COMPUTER NETWORKS:

• Introduction• Network classification• Types of networks• Basic hardware components

Definition: Computer network is a group of interconnected computers. Networks may be classified according to a wide variety of characteristics.

Introduction:

A computer network is a collection of computers and devices

connected to each other. The network allows computers to

communicate with each other and share resources and

information. The Advanced Research Projects Agency (ARPA) designed "Advanced Research Projects Agency Network" (ARPANET) for the United States Department of Defense. It was the first computer network in the world in late 1960s and early 1970s.

Network classification:

The following list presents categories used for classifying

4

Page 5: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

networks

Connection method

Computer networks can also be classified according to the

hardware and software technology that is used to interconnect the individual devices in the network, such as Optical fiber, Ethernet, Wireless LAN, HomePNA, Power line communication or G.hn. Ethernet uses physical wiring to connect devices. Frequently deployed devices include hubs, switches, bridges and/or routers. Wireless LAN technology is designed to connect devices withoutwiring. These devices use radio waves or infrared signals as atransmission medium.

ITU-T G.hn technology uses existing home wiring (coaxial cable, phone lines and power lines) to create a high-speed (up to 1 Gigabit/s) local area network.

Scale

Networks are often classified as Local Area Network (LAN), Wide Area Network (WAN), Metropolitan Area Network (MAN),

Personal Area Network (PAN), Virtual Private Network (VPN),

Campus Area Network (CAN), Storage Area Network (SAN), etc. depending on their scale, scope and purpose. Usage, trust levels and access rights often differ between these types of network – for example, LANs tend to be designed for internal use by an organization's internal systems and employees in individual physical locations (such as a building), while WANs may connect physically separate parts of an organization to each other and may include connections to third parties.

Functional relationship (network architecture)

5

Page 6: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

Computer networks may be classified according to the functional relationships which exist among the elements of the network, e.g., Active Networking, Client-server and Peer-to-peer (workgroup) architecture.

Network topology

Computer networks may be classified according to the network

topology upon which the network is based, such as bus network, star network, ring network, mesh network, star-bus network, tree or hierarchical topology network. Network topology signifies the way in which devices in the network see their logical relations to one another. The use of the term "logical" here is significant. That is, network topology is independent of the "physical" layout of the network. Even if networked computers are physically placed in a linear arrangement, if they are connected via a hub, the network has a Star topology, rather than a bus topology. In this regard the

visual and operational characteristics of a network are distinct; the logical network topology is not necessarily the same as the

physical layout. Networks may be classified based on the method of data used to convey the data, these include digital and analog networks.

Types of networks

Below is a list of the most common types of computer networks.

Personal area network:

6

Page 7: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

A personal area network (PAN) is a computer network used

for communication among computer devices close to one

person. Some examples of devices that are used in a PAN are

printers, fax machines, telephones, PDAs and scanners. The

7

Page 8: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

reach of a PAN is typically about 20-30 feet (approximately 6-9

meters), but this is expected to increase with technology

improvements.

Local area network

A local area network (LAN) is a computer network

covering a small physical area, like a home, office, or small group of buildings, such as a school, or an airport. Current wired LANs are most likely to be based on Ethernet technology, although new standards like ITU-T G.hn also provide a way to create a wired LAN using existing home wires (coaxial cables, phone lines and power lines).

For example, a library may have a wired or wireless

LAN for users to interconnect local devices (e.g., printers and

8

Page 9: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

servers) and to connect to the internet. On a wired LAN, PCs in the library are typically connected by category 5 (Cat5) cable, running the IEEE 802.3 protocol through a system of interconnected devices and eventually connect to the Internet. The cables to the servers are typically on Cat 5e enhanced cable, which will support IEEE 802.3 at 1 Gbit/s. A wireless LAN may exist using a different IEEE protocol, 802.11b, 802.11g or possibly 802.11n.

The staff computers (bright green in the figure) can get to the color printer, checkout records, and the academic network and the Internet. All user computers can get to the Internet and the card catalog. Each workgroup can get to its local printer. Note that the printers are not accessible from outside their workgroup.

Typical library network, in a branching tree topology and controlled access to resources

All interconnected devices must understand the network layer (layer 3), because they are handling multiple subnets (the different colors). Those inside the library, which have only 10/100 Mbit/s Ethernet connections to the user device and a Gigabit Ethernet connection to the central router, could be called "layer 3 switches" because they only have Ethernet interfaces and must understand IP. It would be more correct to call them access routers, where the router at the top is a distribution router that connects to the Internet and academic networks' customer access routers.

The defining characteristics of LANs, in contrast to

WANs (wide area networks), include their higher data transfer

rates, smaller geographic range, and lack of a need for leased

telecommunication lines. Current Ethernet or other IEEE 802.3

LAN technologies operate at speeds up to 10 Gbit/s. This is the

9

Page 10: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

data transfer rate. IEEE has projects investigating the

standardization of 100 Gbit/s, and possibly 400 Gbit/s.

Campus area network

A campus area network (CAN) is a computer network

made up of an interconnection of local area networks (LANs) within a limited geographical area. It can be considered one form Of a metropolitan area network, specific to an academic setting.

In the case of a university campus-based campus area network, the network is likely to link a variety of campus buildings including; academic departments, the university library and student residence halls. A campus area network is larger than a local area network but smaller than a wide area network (WAN) (in some cases).

10

Page 11: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

The main aim of a campus area network is to facilitate students accessing internet and university resources. This is a network that connects two or more LANs but that is limited to a specific and contiguous geographical area such as a college campus, industrial complex, office building, or a military base. A CAN may be considered a type of MAN (metropolitan area network), but is generally limited to a smaller area than a typical MAN. This term is most often used to discuss the implementation of networks for a contiguous area. This should not be confused with a Controller Area Network. A LAN connects network devices over a relatively short distance. A networked office building, school, or home usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per room), and occasionally a LAN will span a group of nearby buildings. In TCP/IP networking, a LAN is often but not always implemented as a single IP subnet.

Metropolitan area network

A metropolitan area network (MAN) is a network that

connects two or more local area networks or campus area networks

11

Page 12: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

together but does not extend beyond the boundaries of the

immediate town/city. Routers, switches and hubs are connected to create a metropolitan area network

Wide area network

A wide area network (WAN) is a computer network that

covers a broad area (i.e. any network whose communications links

12

Page 13: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

cross metropolitan, regional, or national boundaries [1]). Less

formally, a WAN is a network that uses routers and public

communications links. Contrast with personal area networks

(PANs), local area networks (LANs), campus area networks

(CANs), or metropolitan area networks (MANs), which are usually limited to a room, building, campus or specific metropolitan area (e.g., a city) respectively. The largest and most well-known example of a WAN is the Internet.

A WAN is a data communications network that covers a relatively broad geographic area (i.e. one city to another and one country to another country) and that often uses transmission facilities provided by common carriers, such as telephone companies. WAN technologies generally function at the lower three layers of the OSI reference model: the physical layer, the data link layer, and the network layer.

13

Page 14: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

Global area network

A global area networks (GAN) specification is in

development by several groups, and there is no common definition.

In general, however, a GAN is a model for supporting mobile

communications across an arbitrary number of wireless LANs,

satellite coverage areas, etc. The key challenge in mobile

communications is "handing off" the user communications from

one local coverage area to the next. In IEEE Project 802, this

involves a succession of terrestrial WIRELESS local area networks

14

Page 15: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

(WLAN).

Internetwork

Internetworking involves connecting two or more distinct computer networks or network segments via a common routing technology. The result is called an internetwork (often shortened to internet). Two or more networks or network segments connected using devices that operate at layer 3 (the 'network' layer) of the OSI Basic Reference Model, such as a router. Any interconnection among or between public, private, commercial, industrial, or governmental networks may also be defined as an internetwork.

In modern practice, the interconnected networks use the

Internet Protocol. There are at least three variants of internetwork, depending on who administers and who participates in them:

15

Page 16: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

� Intranet

� Extranet

� Internet

Intranets and extranets may or may not have

connections to the Internet. If connected to the Internet, the intranet or extranet is normally protected from being accessed from the Internet without proper authorization. The Internet is not considered to be a part of the intranet or extranet, although it may serve as a portal for access to portions of an extranet.

Intranet

An intranet is a set of networks, using the Internet

Protocol and IP-based tools such as web browsers and file transfer applications, that is under the control of a single administrative entity. That administrative entity closes the intranet to all but specific, authorized users. Most commonly, an intranet is the internal network of an organization. A large intranet will typically have at least one web server to provide users with organizational information

Extranet

An extranet is a network or internetwork that is limited in scope to a single organization or entity but which also has limited connections to the networks of one or more other usually, but not necessarily, trusted

16

Page 17: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

organizations or entities (e.g., a company's customers may be given access to some part of its

intranet creating in this way an extranet, while at the same time the customers may not be considered 'trusted' from a security

standpoint). Technically, an extranet may also be categorized as a CAN, MAN, WAN, or other type of network, although, by

definition, an extranet cannot consist of a single LAN; it must have at least one connection with an external network.

Internet

The Internet is a specific internetwork. It consists of a worldwide interconnection of governmental, academic, public, and private networks based upon the networking technologies of the Internet Protocol Suite. It is the successor of the Advanced Research Projects Agency Network (ARPANET) developed by DARPA of the U.S. Department of Defense. The Internet is also the communications backbone underlying the World Wide Web (WWW). The 'Internet' is most commonly spelled with a capital 'I' as a proper noun, for historical reasons and to distinguish it from other generic internetworks. Participants in the Internet use a diverse array of methods of several hundred documented, and often standardized, protocols compatible with the Internet Protocol Suite and an addressing system (IP Addresses) administered by the Internet

Assigned Numbers Authority and address registries. Service providers and large enterprises exchange information about the reachability of

17

Page 18: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

their address spaces through the Border Gateway Protocol (BGP), forming a redundant worldwide mesh of transmission paths.

Virtual private network

18

Page 19: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

A virtual private network (VPN) is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by physical wires. The link-layer protocols

of the virtual network are said to be tunneled through the larger

network when this is the case. One common application is secure communications through the public Internet, but a VPN need not have explicit security features, such as authentication or content encryption. VPNs, for example, can be used to separate the traffic of different user communities over an underlying network with strong security features.

A VPN may have best-effort performance, or may have

a defined service level agreement (SLA) between the VPN

customer and the VPN service provider. Generally, a VPN has a topology more complex than point-to-point.

19

Page 20: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

A VPN allows computer users to appear to be editing from an IP address location other than the one which connects the

actual computer to the Internet.

Basic hardware components

All networks are made up of basic hardware building blocks to interconnect network nodes, such as Network Interface Cards (NICs), Bridges, Hubs, Switches, and Routers. In addition, some method of connecting these building blocks is required, usually in the form of galvanic cable (most commonly Category 5 cable). Less common are microwave links (as in IEEE 802.12) or optical cable ("optical fiber"). An ethernet card may also be required.

Network interface cards

20

Page 21: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

A network card, network adapter or NIC (network interface card) is a piece of computer hardware designed to allow computers to communicate over a computer network. It provides physical access to a networking medium and often provides a lowlevel addressing system through the use of MAC addresses.

Repeaters

21

Page 22: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

A repeater is an electronic device that receives a signal

and retransmits it at a higher power level, or to the other side of an obstruction, so that the signal can cover longer distances without degradation. In most twisted pair Ethernet configurations, repeaters are required for cable which runs longer than 100 meters.

22

Page 23: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

Hubs

A hub contains multiple ports. When a packet arrives at one port, it is copied unmodified to all ports of the hub for transmission. The destination address in the frame is not changed to a broadcast address.

Bridges

23

Page 24: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

A network bridge connects multiple network segments at the data link layer (layer 2) of the OSI model. Bridges do not promiscuously copy traffic to all ports, as hubs do, but learn which MAC addresses are reachable through specific ports. Once the bridge associates a port and an address, it will send traffic for that address only to that port. Bridges do send broadcasts to all ports except the one on which the broadcast was received. Bridges learn the association of ports and addresses by examining the source address of frames that it sees on various ports. Once a frame arrives through a port, its source address is stored and the bridge assumes that MAC address is associated with that port. The first time that a previously unknown destination address is seen, the bridge will forward the frame to all ports other than the one on which the frame arrived.

Bridges come in three basic types:

1. Local bridges: Directly connect local area networks (LANs)

2. Remote bridges: Can be used to create a wide area network

(WAN) link between LANs. Remote bridges, where the connecting link is slower than the end networks, largely have

been replaced by routers.

3. Wireless bridges: Can be used to join LANs or connect

remote stations to LANs.

Switches

24

Page 25: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

A switch is a device that forwards and filters OSI layer 2 datagrams (chunk of data communication) between ports(connected cables) based on the MAC addresses in the packets. This is distinct from a hub in that it only forwards the packets to the ports involved in the communications rather than all ports connected. Strictly speaking, a switch is not capable of routing traffic based on IP address (OSI Layer 3) which is necessary for communicating between network segments or within a large or complex LAN. Some switches are capable of routing based on IP addresses but are still called switches as a marketing term. A switch normally has numerous ports, with the intention being that most or all of the network is connected directly to the switch, or another switch that is in turn connected to a switch.

Switch is a marketing term that encompasses routers and bridges, as well as devices that may distribute traffic on load or by application content (e.g., a Web URL identifier). Switches may operate at one or more OSI model layers, including physical, data link, network, or transport (i.e., end-to-end). A device that operates simultaneously at more than one of these layers is called a multilayer switch.

25

Page 26: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

Overemphasizing the ill-defined term "switch" often leads to confusion when first trying to understand networking. Many experienced network designers and operators recommend starting with the logic of devices dealing with only one protocol

level, not all of which are covered by OSI. Multilayer device selection is an advanced topic that may lead to selecting particular implementations, but multilayer switching is simply not a real world design concept.

Routers

Routers are networking devices that forward data packets between networks using headers and forwarding tables to determine the best path to forward the packets.

INTRODUCTION

Virtual private network

26

Page 27: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

A virtual private network (VPN) is a computer network in which some of the links between nodes are carried by open connections or virtual circuits in some larger network (e.g., the Internet) instead of by physical wires. The link-layer protocols of the virtual network are said to be tunneled through the larger network when this is the case. One common application is secure communications through the public Internet, but a VPN need not have explicit security features, such as authentication or content encryption. VPNs, for example, can be used to separate the traffic of different user communities over an underlying network with strong security features.

A VPN may have best-effort performance, or may have a defined service level agreement (SLA) between the VPN customer and the VPN service provider. Generally, a VPN has a topology more complex than point-to-point.

27

Page 28: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

A VPN allows computer users to appear to be editing from an IP address location other than the one which connects the actual computer to the Internet.It gives extremely secure connections between private networks linked through the Internet. It allows remote computers to act as though they were on the same secure, local network.

It is a way to use a public telecommunication infrastructure, such as the Internet, to provide remote offices or individual users with secure access to their organization's network.

It is a form of communication over networks that are public in ownership, but emulate a private network in terms of security.

A VPN is a private tunnel through the Internet that is designed to connect a remote office or employee into a main server. The virtual private network is slow because all the data sent back and forth to the server is locked down and encrypted. This is to ensure the data is secure as it travels through the vast expanse of the Internet.

VPN ACCOUNT AND CERTIFICATE:

ACCOUNT:

• Verification by HOD and Web Coordinator. • Communicated through Email.

DIGITAL CERTIFICATE:

• The digital certificate enrollment : online through http://vpnca.nic.in/certsrv

• Mail the request ID .• Verification and issued

28

Page 29: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

• Certificate derived from site / send by mail

Installing the VPN client software:

1. Install setup ‘ windows installer package’ for Windows XP/ 2000

2. For windows 98 the software is available in http://ftp.ren.nic.in/pub/Cisco/vpn/VPN%20client%20software/vpnclient-win-is-3-6.6-a-k9.exe

3. Client software is in Zip format. Unzipp it

4. For Linux , the software is available in

http://ftp.ren.nic.in/pub/Cisco/vpn/VPN%20client%20software/vpnclient-linux-4.6.02003-k9.tar.gz

HISTORY

Until the end of the 1990s the computers in computer networks connected through very expensive leased lines and/or dial-up phone lines. It could cost thousands of dollars for 56kbps lines or tens of thousands for T1 lines, depending on the distance between the sites.Virtual Private Networks reduce network costs because they avoid a need for many leased lines that individually connect to the Internet. Users can exchange private data securely, making the expensive leased

29

Page 30: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

lines redundant. The term VPN has been associated in the past with such remote connectivity services as the public telephone network and Frame Relay PVCs, but has finally settled in as being synonymous with IP-based data networking. Before this concept surfaced, large corporations had expended considerable resources to set up complex private networks,now commonly called Intranets. These networks were installed using costly leased line services, Frame Relay, and ATM to incorporate remote users. For the smaller sites and mobile workers on theremote end, companies supplemented their networks with remote access servers or ISDN.At the same time, the small- to medium-sized enterprises (SMEs), who could not afforddedicated leased lines, were relegated to low-speed switched services.As the Internet became more and more accessible and bandwidth capacities grew,companies began to offload their Intranets to the web and create what are now known as Extranets to link internal and external users. However, as cost-effective and quick-todeployas the Internet is, there is one fundamental problem – security.Today’s VPN solutions overcome the security factor. Using special tunneling protocols and complex encryption procedures, data integrity and privacy is achieved in what seems,for the most part, like a dedicated point-to-point connection. And, because these operations occur over a public network, VPNs can costsignificantly less to implement than privately owned or leased services.Although early VPNs required extensive expertise to implement, the technology has matured already to a level that makes its deployment a simple and affordable solution for businesses of all sizes, including SMEs who were previously being left out of the e-revolution.Using the Internet, companies can connect their remote branch offices, project teams,business partners, and e-customers into the main corporate network. Mobile workers and telecommuters can get secure connectivity by dialing into the POP (Point-of-Presence) of a local ISP (Internet Service Provider). With a VPN, corporations see immediate costreduction opportunities in their long distance charges (especially important to global companies), leased line fees, equipment inventories (like large banks of modems), andnetwork support requirements.

30

Page 31: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

VPN technologies have myriad protocols, terminologies and marketing influences that define them. For example, VPN technologies can differ in:

1.The protocols they use to tunnel the traffic

2.The tunnel's termination point, i.e., customer edge or network provider edge

3.Whether they offer site-to-site or remote access connectivity

4.The levels of security provided

5.The OSI layer they present to the connecting network, such as Layer 2 circuits or Layer 3 network connectivity.

REQUIREMENTS:

Operating System Computer Requirements

Windows 2000 SP4.

Windows XP SP2.

Windows Vista.

Windows 7

Computer with a

Pentium®-class

processor or

greater.

In addition, x64 or

x86 processors are

supported for

Windows XP and

• 5 MB hard disk space.

• RAM:

– 128 MB for Windows 2000.

– 256 MB for Windows XP.

– 512 MB for Windows Vista.

31

Page 32: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

Windows Vista. • Microsoft Installer, version 3.

Mac OS X, Version

10.4 or later

Macintosh

computer1

50 MB hard disk space

Requirements for VPNs

There is one very important requirement that is common to secure VPNs, trusted VPNs, and hybrid VPNs: the VPN administrator must know the extent of the VPN. Regardless of the type of VPN in use, a VPN is meant to have capabilities that the "regular" network does not. Thus, the VPN administrator must be able to know at all times what data will and will not be in the VPN.

Each of the four types of VPNs have their own additional requirements.

Secure VPN requirements

All traffic on the secure VPN must be encrypted and authenticated. Many of the protocols that are used to create secure VPNs allow the creation of VPNs that have authentication but no encryption. Although such a network is more secure than a network with no authentication, it is not a VPN because there is no privacy.

The security properties of the VPN must be agreed to by all parties in the VPN. Secure VPNs have one or more tunnels, and each tunnel has two endpoints. The administrators of the two endpoints of each tunnel must be able to agree on the security properties of the tunnel.

No one outside the VPN can affect the security properties of the VPN. It must be impossible for an attacker to change the security properties of any part of a VPN, such as to weaken the encryption or to affect which encryption keys are used.

Trusted VPN requirements

No one other than the trusted VPN provider can affect the creation or modification of a path in the VPN. The entire value of the trusted

32

Page 33: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

VPN is that the customer can trust that the provider to provision and control the VPN. Therefore, no one outside the realm of trust can change any part of the VPN. Note that some VPNs span more than one provider; in this case, the customer is trusting the group of providers as if they were a single provider.

No one other than the trusted VPN provider can change data, inject data, or delete data on a path in the VPN. A trusted VPN is more than just a set of paths: it is also the data that flows along those paths. Although the paths are typically shared among many customers of a provider, the path itself must be specific to the VPN and no one other than trusted provider can affect the data on that path. Such a change by an outside party would affect the characteristics of the path itself, such as the amount of traffic measured on the path.

The routing and addressing used in a trusted VPN must be established before the VPN is created. The customer must know what is expected of the customer, and what is expected of the service provider, so that they can plan for maintaining the network that they are purchasing.

Hybrid VPN requirements

The address boundaries of the secure VPN within the trusted VPN must be extremely clear. In a hybrid VPN, the secure VPN may be a subset of the trusted VPN, such as if one department in a corporation runs its own secure VPN over the corporate trusted VPN. For any given pair of address in a hybrid VPN, the VPN administrator must be able to definitively say whether or not traffic between those two addresses is part of the secure VPN.

33

Page 34: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

Different Types of VPN

A VPN supports at least three different modes of use:

Under this application only a single VPN gateway is involved. The

other party involved in negotiating the secure communication

channel with the VPN Gateway is a PC or laptops that is onnected

to the Internet and running VPN Client software. The VPN Client

allows telecommuters and traveling users to communicate on the

central network and access servers from many different locations.

BENEFIT : Significant cost savings by reducing the burden of

long distance charges associated with dial-up access. Also helps

34

Page 35: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

increase productivity and peace of mind by ensuring secure

network access regardless of where an employee physically is.

2. Site to site : Dedicated VPN connection established among

multiple LANs . Each site requires one a local leased/ RF/ ISDN

connection to the local ISPs .

With Intranet VPN, gateways at various physical locations within

the same business negotiate a secure communication channel

across the Internet known as a VPN tunnel. An example would be

a network that exists in several buildings connected to a data

center or mainframe that has secure access through private lines.

Users from the networks on either side of the tunnel can

communicate with one another as if it were a single network.

These may need strong encryption and strict performance and

bandwidth requirements.

BENEFIT : Substantial cost savings over traditional leased-line or

frame relay technologies through the use of Internet to bridge

potentially long distances between sites.

3.Site-to-Site Extranet VPN - Almost identical to Intranets, except

they are meant for external business partners. As such, firewall

access restrictions are used in conjunction with VPN tunnels, so

35

Page 36: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

that business partners are only able to gain secure access to

specific data / resources, while not gaining access to private

corporate information.

BENEFIT : Businesses enjoy the same policies as a private

network, including security, QoS, manageability, and reliability.

Desired VPN Features :

The workgroup found that the following characteristics are necessary for a successful UC Davis VPN implementation:

1.Available to all CyberSafe remote computers. Every vendor supported end-user platform should be able to use the VPN service, but VPN access from computing systems that are or can be compromised should be denied.

2. Easily supportable. VPN implementation must not substantially increase help desk utilization or costs.

3. Integrate with existing authentication/authorization infrastructure. The log-in procedure should be simpler and less confusing than current proxy login.

4. Security that is not “one size fits all”. The ability to assign remote users to security zones based on authorization groups is highly desirable in many circumstances. For example, SSL VPN technology could be

36

Page 37: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

used to enhance campus wireless security through the assignment of users to trusted and untrusted zones depending on their affiliation.

5. Granular administration. A VPN implementation that permits administrative delegation in an environment of central control would be highly desirable. A vendor solution that permits departmental participation through independent purchase of compatible equipment may also be acceptable.

6. Split tunnel services. Split tunnel services should be supported by a campus VPN implementation.

7. Browser support. The SSL VPN solution must be compatible with current Internet Web browsers, including Internet Explorer, Safari, Netscape, Opera and Firefox. 8. Monitoring and logging. Monitoring should go beyond the indispensable network utilization and error reporting level. Any VPN solution has to provide logging that is integrated with syslog services. In the case of DMCA violations, the University must be able to remove access to infringing files upon notification. For resources licensed by the UC Office of the President and the Davis campus, the University is obligated by contract to remedy abuses or suffer penalties that could include denial to future resource access for all campus users. For those reasons, it is necessary to associate user identity and activity. The obligation to remedy abuse is a requirement for departments even if they manage VPNs independently.

9. Scalability. It should be possible to begin small and economically increase capacity without degrading performance. Technical details relating to interoperation with the existing VLAN infrastructure may contribute significantly in this respect.

10. Hardened. The VPN platform should have a hardened operating system and firmware that provide no opportunities for exploits. 11. Operation 24x7x365. Every hour of the night and day, some UC Davis affiliate uses campus resources remotely, so we require a high

37

Page 38: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

availability platform. An active/passive configuration would provide fail-safe operation if a load balancing active/active configuration was unaffordable.

12. Supported. As a core service, VPN would require 24x7 vendor telephone support and 24x7 hardware maintenance availability.

The workgroup identified one feature, Endpoint Security

Integration, which will require further analysis. While end-point

security is a highly desirable function for entry to the campus

network, the ability to check an operating system version,

application of security patches or the currency of anti-virus

detection files would likely benefit the campus as part of a broader

offering, integrated into network access for wired, wireless and

VPN services. Nonetheless, some SSL VPN products are capable

of using the endpoint security services to check for specific

programs and files needed for interoperation with particular

servers and services.

38

Page 39: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

Technologies Supported by VPNC

The following technologies support the requirements from the previous section. VPNC supports these technologies when they are implemented by users themselves and when they are implemented in provider-provisioned VPNs.

5.1 Secure VPN technologies

IPsec with encryption in either tunnel and transport modes. The security associations can be set up either manually or using IKE with either certificates or preshared secrets.

IPsec, short for Internet Protocol Security, can run in either transport or tunnel mode, eachhaving significantly different implications particularly with regard to security — tunnel mode will encrypt both the header information as well as the data transmitted, whereas transport mode will encrypt only the data. Keys must be shared by both the sender and recipient in order to correctly decrypt the transmission.IPsec works at Layer 3, or the Network Layer of the OSI Model, which enables it to operate independently of any application. An IPsec VPN reates a tunnel between two endpoints through which any number of connections and protocol types (Web, email, file transfer, VoIP) can travel. The original IP data packet is re-encapsulated so that all application protocol information is hidden during the actual transmission of the data. A typical deployment will consist of one or more VPN gateways to the secured networks. Special VPN client software must be installed on each remote access user’s computer, and each VPN client must be configured to define which packets should be encrypted and which gateway is to be used for the VPN tunnel. Once connected, the client becomes a full member of the secured network, able to see and

39

Page 40: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

access everything just as if that system was actually physically connected to the network.

IPsec inside of L2TP : has significant deployment for client-server remote access secure VPNs.

SSL (Secure Socket Layer) VPNs :are often referred to as transparent, or clientless, due to the lack of any additional client-side VPN software that must be explicitly installed. The SSL components required to create a secure channel from the remote system are a part of all major Web browsers, at least one of which is always already available on virtually every modern computer. The only new item that is necessary is a designated SSL VPN server, to act as the gateway between the secured network and all remote systems. The SSL protocol operates in Layer 7, the Application Layer, allowing it to act as a proxy for the secured resources. Authentication of both the client and the server is achieved during the initial handshake routine where both parties identify themselves via digital certificates. The handshake process also generates session keys which are used to encrypt all traffic sent and received during a remote access session. These technologies (other than SSL 3.0) are standardized in the IETF, and each has many vendors who have shown their products to interoperate well in the field. An SSL VPN can

maintain and enforce finer-grained access control policies, to individualinternal resources as well as by individual users, by intercepting all traffic between the authenticated remote system and the requested resource inside the secured network. This introduces greater flexibility since now virtually any computer with an Internet connection canbe used for secure remote access — home computers, computers on customers’ premises, andeven Internet cafés!

IPsec vs SSL VPNs

IPsec and SSL each have their own advantages, so what is “better” may often come down to what is most suited for your network, but many

40

Page 41: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

organizations are increasingly turning to SSL VPNs for the additional benefits available.

5.2 Trusted VPN technologies

Modern service providers offer many different types of trusted VPNs. These can generally be separated into "layer 2" and "layer 3" VPNs.

Technologies for trusted layer 2 VPNs include:

• ATM circuits

• Frame relay circuits

Multi-Protocol Label Switching (MPLS) :Multi-Protocol Label Switching (MPLS) was originally presented as a way of improving the forwarding speed of routers but is now emerging as a crucial standard technology that offers new capabilities for large scale IP networks. Traffic engineering, the ability of network operators to dictate the path that traffic takes through their network, and Virtual Private Network support are examples of two key applications where MPLS is superior to any currently available IP technology.

Although MPLS was conceived as being independent of Layer 2, much of the excitement generated by MPLS revolves around its promise to provide a more effective means of deploying IP networks across ATM-based WAN backbones. The Internet Engineering Task Force is developing MPLS with draft standards expected by the end of 1998. MPLS is viewed by some as one of the most important network developments of the 1990's. This article will explain why MPLS is generating such interest.

The essence of MPLS is the generation of a short fixed-length label that acts as a shorthand representation of an IP packet's header. This is much the same way as a ZIP code is shorthand for the house, street and city in a postal address, and the use of that label to make forwarding decisions about the packet. IP packets have a field in their 'header' that contains the address to which the packet is to be routed. Traditional routed networks process this information at every router in a packet's path through the network (hop by hop routing).

41

Page 42: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

In MPLS, the IP packets are encapsulated with these labels by the first MPLS device they encounter as they enter the network. The MPLS edge router analyses the contents of the IP header and selects an appropriate label with which to encapsulate the packet. Part of the great power of MPLS comes from the fact that, in contrast to conventional IP routing, this analysis can be based on more than just the destination address carried in the IP header. At all the subsequent nodes within the network the MPLS label, and not the IP header, is used to make the forwarding decision for the packet. Finally, as MPLS labeled packets leave the network, another edge router removes the labels.

In MPLS terminology, the packet handling nodes or routers are called Label Switched Routers (LSRs). The derivation of the term should be obvious; MPLS routers forward packets by making switching decisions based on the MPLS label. This illustrates another of the key concepts in MPLS. Conventional IP routers contain routing tables which are looked up using the IP header from a packet to decide how to forward that packet. These tables are built by IP routing protocols (e.g., RIP or OSPF) which carry around IP reachability information in the form of IP addresses. In practice, we find that forwarding (IP header lookup) and control planes (generation of the routing tables) are tightly coupled. Since MPLS forwarding is based on labels it is possible to cleanly separate the (label-based) forwarding plane from the routing protocol control plane. By separating the two, each can be modified independently. With such a separation, we don't need to change the forwarding machinery, for example, to migrate a new routing strategy into the network.

There are two broad categories of LSR. At the edge of the network, we require high performance packet classifiers that can apply (and remove) the requisite labels: we call these MPLS edge routers. Core LSRs need to be capable of processing the labeled packets at extremely high bandwidths.

This is an abstract of the MPLS article contained in techguide.com. The complete article examines MPLS and the opportunities it offers to users and also to the service providers who are designing and

42

Page 43: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

engineering the next generation of IP networks. It also describes why new carrier-class edge devices will become a key component in the provisioning of future network services.

Technologies for trusted layer 3 VPNs include:

• MPLS with constrained distribution of routing information through BGP, as described in RFC 4364 and other related Internet Drafts.

It is widely assumed that both will become standards in the future. Also, the service provider industry has not embraced one of these technologies much more strongly than the other.

5.3 Hybrid VPN technologies

• Any supported secure VPN technologies running over any supported trusted VPN technology.

It is important to note that a hybrid VPN is only secure in the parts that are based on secure VPNs. That is, adding a secure VPN to a trusted VPN does not increase the security for the entire trusted VPN, only to the part that was directly secured. The secure VPN acquires the advantages of the trusted VPN, such as having known QoS features.

Protocols Used

The protocol incorporates three major components: the

Authentication Header (AH), Encapsulating Security Payload

(ESP), and Internet Key Exchange (IKE).

VPN Tunneling Protocols

43

Page 44: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

Several computer network protocols have been implemented

specifically for use with VPN tunnels. The three most popular

VPN tunneling protocols listed below continue to compete with

each other for acceptance in the industry. These protocols are

generally incompatible with each other.

Point-to-Point Tunneling Protocol (PPTP)

Several corporations worked together to create the PPTP specification. People generally associate PPTP with Microsoft because nearly all flavors of Windows include built-in client support for this protocol. The initial releases of PPTP for Windows by Microsoft contained security features that some experts claimed were too weak for serious use. Microsoft continues to improve its PPTP support, though.

PPTP VPN Tunnel Frame Format

44

Page 45: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

A PPP frame (an IP datagram, an IPX datagram, or a NetBEUI frame) is wrapped with a Generic Routing Encapsulation (GRE) header and an IP header. In the IP header is the source and destination IP address that correspond to the VPN client and VPN server.

Normal IP Packet without VPN

Point-to-Point Tunneling Protocol (PPTP) is a proprietary development of Microsoft intended for VPN-like communications. PPTP offers user authentication employing authentication protocols such as MS-CHAP, CHAP, SPAP, and PAP. The protocol lacks the flexibility offered by other solutions and does not possess the same level of interoperability as the other VPN protocols, but its use is easy and abundant in the real world.

PPTP PACKET

It consists of three types of communication:

• PPTP connection, where a client establishes a PPP link to an ISP.

45

Page 46: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

• PPTP control connection, where the user creates a PPTP

connection to the VPN server and negotiates the tunnel

characteristics.

• PPTP data tunnel, where both client and server exchange

communications inside an encrypted tunnel.

PPTP is commonly used for creation of secure communication channels between a large number of Windows hosts on the intranet. We have to caution you that it has a long history of insecurities and typically uses lower grade encryption ciphers, such as MD4 or DES.

Layer Two Tunneling Protocol (L2TP)

The original competitor to PPTP for VPN tunneling was L2F, a protocol implemented primarily in Cisco products. In an attempt to improve on L2F, the best features of it and PPTP were combined to create a new standard called L2TP. Like PPTP, L2TP exists at the data link layer (Layer Two) in the OSI model -- thus the origin of its name. Jointly developed by Cisco, Microsoft, and 3Com, L2TP promised to replace PPTP as a major tunneling protocol. It is essentially a combination of PPTP and Cisco Layer Two Forwarding (L2F), merging both into a single standard. L2TP is used to tunnel PPP over a public IP network.

L2TP : Tunneling with IPSec Encryption

46

Page 47: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

It relies on PPP to establish a dial-in connection using PAP or CHAP authentication but, unlike PPTP, L2TP defines its own tunneling protocol. Because L2TP works on Layer 2, the non-IP protocols can be transported through the tunnel, yet it will work on any Layer 2 media, such as ATM, Frame Relay, or 802.11. The protocol does not offer encryption by itself, but it can be used in conjunction with the other protocols or application-layer encryption mechanisms to provide for security needs.

Internet Protocol Security (IPsec)

IPsec is actually a collection of multiple related protocols. It can be used as a complete VPN protocol solution or simply as the encryption scheme within L2TP or PPTP. IPsec exists at the network layer (Layer Three) of the OSI model.

Internet Protocol Security (IPsec) is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP

47

Page 48: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

packet of a data stream. IPsec also includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to be used during the session. IPsec can be used to protect data flows between a pair of hosts (e.g. computer users or servers), between a pair of security gateways (e.g. routers or firewalls), or between a security gateway and a host.

IPsec is a dual mode, end-to-end, security scheme operating between the Internet and Transport layers of the Internet Protocol Suite. It effectively acts as an additional, optional "presentation layer" considering a transport level protocol the application.

Some other Internet security systems in widespread use, such as Secure Sockets Layer (SSL), Transport Layer Security (TLS) and Secure Shell (SSH), operate in the upper layers of these models. Hence, IPsec can be used for protecting any application traffic across the Internet. Applications don't need to be specifically designed to use IPsec. The use of TLS/SSL, on the other hand, must typically be incorporated into the design of applications.

IPsec is a successor of the ISO standard Network Layer Security Protocol (NLSP). NLSP was based on the SP3 protocol that was published by NIST, but designed by the Secure Data Network System project of the National Security Agency (NSA).

IPsec is officially specified by the Internet Engineering Task Force (IETF) in a series of Requests for Comment addressing various components and extensions, including the official capitalization style of the term.

The IPsec suite is a framework of open standards. IPsec uses the following protocols to perform various functions.

48

Page 49: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

• A security association (SA) is set up by Internet Key Exchange (IKE and IKEv2) or Kerberized Internet Negotiation of Keys (KINK) by handling negotiation of protocols and algorithms and to generate the encryption and authentication keys to be used by IPsec.

• Authentication Header (AH) to provide connectionless integrity and data origin authentication for IP datagrams and to provide protection against replay attacks.

• Encapsulating Security Payload (ESP) to provide confidentiality, data origin authentication, connectionless integrity, an anti-replay service (a form of partial sequence integrity), and limited traffic flow confidentiality.

Modes of operation

IPsec can be implemented in a host-to-host transport mode, as well as in a network tunnel mode.

Transport mode

In transport mode, only the payload (the data you transfer) of the IP packet is encrypted and/or authenticated. The routing is intact, since the IP header is neither modified nor encrypted; however, when the authentication header is used, the IP addresses cannot be translated, as this will invalidate the hash value. The transport and application layers are always secured by hash, so they cannot be modified in

49

Page 50: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

any way (for example by translating the port numbers). Transport mode is used for host-to-host communications.

A means to encapsulate IPsec messages for NAT traversal has been defined by RFC documents describing the NAT-T mechanism.

Tunnel mode

In tunnel mode, the entire IP packet is encrypted and/or authenticated. It is then encapsulated into a new IP packet with a new IP header. Tunnel mode is used to create Virtual Private Networks for network-to-network communications (e.g. between routers to link sites), host-to-network communications (e.g. remote user access), and host-to-host communications (e.g. private chat).

50

Page 51: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

GRE

Generic Routing Encapsulation (GRE) is a Cisco-developed protocol that is used in networking to tunnel traffic between different private networks. This includes non-IP traffic that cannot be carried across the network in its native form. Even though it does not provide any encryption by itself, it does provide efficient low-overhead tunneling. GRE is often used in conjunction with network-layer encryption protocols to accommodate both features provided by GRE, such as encapsulation of non-IP protocols, and encryption provided by other protocols, such as IPSec.

GRE tunnels are designed to be completely stateless. This means that each tunnel end-point does not keep any information about the state or availability of the remote tunnel end-point. A consequence of this is that the local tunnel end-point router does not have the ability to bring the line protocol of the GRE tunnel interface down if the remote end-point is unreachable. The ability to mark an interface as down when the remote end of the link is not available is used in order to remove any routes (specifically static routes) in the routing table that use that interface as the outbound interface. Specifically, if the line protocol for an interface is changed to down, then any static routes that point out that interface are removed from the routing table. This allows for the installation of an alternate (floating) static route or for policy-based routing (PBR) to select an alternate next-hop or interface.

Normally, a GRE tunnel interface comes up as soon as it is configured and it stays up as long as there is a valid tunnel source address or interface which is up. The tunnel destination IP address must also be routable. This is true even if the other side of the tunnel has not been configured. This means that a static route or PBR forwarding of packets

51

Page 52: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

via the GRE tunnel interface remains in effect even though the GRE tunnel packets do not reach the other end of the tunnel.

VPNs IN MOBILE ENVIRONMENTS:

Mobile VPNs handle the special circumstances when an endpoint of the VPN is not fixed to a single IP address, but instead roams across various networks such as data networks from cellular carriers or between multiple Wi-Fi access points. Mobile VPNs have been widely used in public safety, where they give law enforcement officers access to mission-critical applications, such as computer-assisted dispatch and criminal databases, as they travel between different subnets of a mobile

52

Page 53: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

network.They are also used in field service management and by healthcare organizations, among other industries.

Increasingly, mobile VPNs are being adopted by mobile professionals and white-collar workers who need reliable connections. They allow users to roam seamlessly across networks and in and out of wireless-coverage areas without losing application sessions or dropping the secure VPN session. A conventional VPN cannot survive such events because the network tunnel is disrupted, causing applications to disconnect, time out, or fail, or even cause the computing device itself to crash.

Instead of logically tying the endpoint of the network tunnel to the physical IP address, each tunnel is bound to a permanently associated IP address at the device. The mobile VPN software handles the necessary network authentication and maintains the network sessions in a manner transparent to the application and the user. The Host Identity Protocol (HIP), under study by the Internet Engineering Task Force, is designed to support mobility of hosts by separating the role of IP addresses for host identification from their locator functionality in an IP network. With HIP a mobile host maintains its logical connections established via the host identity identifier while associating with different IP addresses when roaming between access networks.

ADVANTAGES AND DISADVANTAGES OF VPN:

53

Page 54: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

Advantages of VPN

►Enhanced security. When you connect to the network through a VPN, the data is kept secured and encrypted. In this way the information is away from hackers’ eyes.

►Remote control. In case of a company, the great advantage of having a VPN is that the information can be accessed remotely even from home or from any other place. That’s why a VPN can increase productivity within a company.

►Share files. A VPN service can be used if you have a group that needs to share files for a long period of time.

►Online anonymity. Through a VPN you can browse the web in complete anonymity. Compared to hide IP software or web proxies, the advantage of a VPN service is that it allows you to access both web applications and websites in complete anonymity.

►Unblock websites & bypass filters. VPNs are great for accessing blocked websites or for bypassing Internet filters. This is why there is an increased number of VPN services used in countries where Internet censorship is applied.

►Change IP address. If you need an IP address from another country, then a VPN can provide you this.

►Better performance. Bandwidth and efficiency of the network can be generally increased once a VPN solution is implemented.

►Reduce costs. Once a VPN network is created, the maintenance cost is very low. More than that, if you opt for a service provider, the network setup and surveillance is no more a concern.

►Firewall connection: Your system is often attacked by several hackers who may possibly misuse your private data. But with VPN account, the activities won't be on your IP address as your specific IP

54

Page 55: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

address will not likely be seen. Your computer is completely secured as the hackers will attack the VPN server IP. So, the cyber-terrorist will be confident that they are attacking your home personal computer IP address, but this IP address will be the business IP address.

►Access from anywhere in the world: Often in gulf countries and even numerous other countries for instance China, Singapore, Myanmar, Syria, Yemen, Korea, etc. you ought to deal with numerous limitations. But with VPN account, you can surf on the internet freely with no restrictions at all.

►Highest level of security against password thefts: Your VPN account even safe guards your system from password robbery therefore allowing you to browse on the web without any strain. However, with VPN account there is no worry about password theft even if you are surfing through Wi-Fi connectivity.

Disadvantages of VPN

►Lack of Security:VPN message traffic is carried on public networking infrastructure e.g. the Internet, or over a service provider's network, which mean - circulating corporate data —one of your most valuable assets—on the line (literally). Even though there are many methods and technologies available to ensure data protection (like encryption implementation) , the level of concern about Internet security is quite high and data on transmission is vulnerable to hackers. The use of VPNs at this moment still require an in-depth understanding of public network security issues.

►Less Bandwidth than Dedicated Line :The other major

downside of VPNs relates to guaranteeing adequate bandwidth for

the work being done. Every use of internet system consume

bandwidth; the more users there are, the less bandwidth there is for

any single user. Some VPN service providers offer guaranteed

55

Page 56: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

bandwidth, and private networks can be built with guaranteed

bandwidth allocations, however, these options will increase the

cost of the system.

►The needs to accomodate protocols other than IP and

existing ("legacy") internal network technology:IP applications

were designed for low-latency, high-reliability networks. An

increasing number of real-time, interactive applications are being

used on the network. Although some applications can be tuned to

allow for increased latency, many of the applications tested cannot

be easily adjusted or cannot be adjusted at all, making the use of

the application problematic.

►others pitfall to consider:

• VPN technologies from different vendors may not work well

together due to different standard compliant or immature

standards.

• VPNs is more prone to Internet connectivity problems.

• The availability and performance of an organization's wide-

area VPN (over the Internet in particular) depends on factors

largely outside of their control.

• Understanding of security issues

• Unpredictable Internet traffic

56

Page 57: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

• Less Bandwidth as compared to Leased Lines• Difficult to accommodate products from different vendors

Limitations of VPN

Although the VPN Service should enable you to access many restricted resources from outside the network, it does have some limitations. As a result of these limitations, we recommend that you use the VPN connection only when you need to access resources that you would otherwise be unable to access and that you terminate the connection as soon as you have finished accessing these resources. Most of the limitations arise because while the VPN connection is active, the PC behaves as if it were part of the Oxford University network, and therefore some resources that are local to it may not be available while the connection is active. Some particular limitations are listed below.

►If you are making the VPN connection over a dial-up internet connection that uses a standard modem and phone line, you may find that some services are very slow. In particular this may be the case if you are using the full version of OxLIP (as opposed to the web version) which may take 10 minutes or more just to start up. If you find this to be the case and you really need access to the full version of OxLIP, consider increasing the speed of your underlying internet connection, e.g. by switching to a broadband connection.

►While the VPN connection is active you are unlikely to be able to print to any printer unless it is directly attached to your PC. To get around this problem, save or copy information that you require into a file on your computer and print it once the VPN connection is closed.

57

Page 58: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

►If the PC that you are using is connected to a network, make sure that you close any files that are stored on servers on that network before making the VPN connection because you will not be able to access them when the connection is active. If you need to copy or save information into a file while the connection is active, save the file onto the local hard disk of the PC, or onto floppy disk, zip disk etc.

►If the PC that you are using is connected to a network and you are running software that is located on servers on that network rather than locally on the PC, again you will not be able to access this software while the VPN connection is active, so we recommend that you close any such programs before making the connection.

►If you connect to the Internet using a dial-up service, you probably won't be able to send out e-mail via your service provider while the connection is active.

►If you are connecting from behind a firewall you may have problems either establishing the connection in the first place, or you may find that you can make the connection but then you cannot access anything over the internet. Please contact OUCS for more information on specific ports used by the VPN connection.

Study of VPN in NIC

In big organizations such as NIC(National Informatics Centre) VPN services are used to a great extend .VPN servers are setted in the NIC from where they provide the VPN service all around the world .The request for the vpn service send to them by people all around the world and they make them the VPN client .Proper procedure is being followed in making the VPN client .A Digital Certificate is being issued to the clients which has an expiry date linked with it and should be renewed at times .The whole data of the VPN client is maintained in the organization about the sites they want to access and all.Thus VPN services are provided to them ,username and password is issued to the vpn client .Thus the

58

Page 59: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

clints can securely access the network. NIC looks to all the Problems related to the VPN services.They have their sites such as www.inoc.nic.in maintained for such

purposes.

FUTURE PROSPECTIVES

VPN in future will be used in more areas like:

►Sales professionals, field technical specialists and others working from remote offices.

►Employees who are required to frequently work from home.

►Employees whose time spent online exceed an average of 20 hours per week.

►Executive and key management personnel who frequently need access from home.

►Support personnel who need remote access to JnJ Network to carry out business critical activities.

►VPNs are continually being enhanced.

59

Page 60: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

Example: Equant NV

►As the VPN market becomes larger, more applications will be created along with more VPN providers and new VPN types.

►Networks are expected to converge to create an integrated VPN

►Improved protocols are expected, which will also improve VPNs.

CONCLUSION:

In a nutshell, a VPN is exactly what its name suggests, a pseudo-private network. Instead of building a SECURED PHYSICAL CONNECTION directly to the mobile employees (which is a very expensive proposition, not to mention inflexible), VPN makes use of the VERY PUBLIC and VERY UNSECURED Internet to connect the employees to the office securely.

VPNs are increasingly becoming an everyday part of life on the Internet. Many people use them to gain access to many of the systems in their offices, such as e-mail and intranets. This trend is certain to become more popular as many companies are finding it cheaper for their employees to work from home, relieving them of the need to lease additional office space.

Site-to-site VPNs will also continue to be deployed as companies, both small and large find it increasingly necessary to share access to their business systems. One notable area is in the realm of IP telephony, where VPNs enable all remote offices to use a single IP switchboard at

60

Page 61: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

the center of a VPN hub and spoke network. Intra-office communication is therefore encrypted and the use of a single switchboard saves costs.

Knowledge of VPNs is now indispensable for systems administrators. We have seen in this tutorial the two main ways a VPN is used today as well as the three main protocols that are used. The PPTP protocol is particularly useful for RoadWarrior connections. L2TP is similar but also has the ability of encapsulating all types of network traffic and can therefore route everything, even protocols that normally can not be routed without encapsulation.

The IPSec protocol is ideal for LAN to LAN tunnels as it offers security at each layer of the communication. IPSec, with its installation in IPv6, will become the most widely used tunnelling protocol in both VPN domains (LAN to LAN and RoadWarrior). One thing that should be focused on is the encryption that you want to use with your VPN connection so that your data is encrypted.

VPN is a network that uses public telecommunication infrastructure for the following purposes:

1. It helps in extent geographic connectivity.

2.It reduces cost of WAN connection.

3.It helps in increasing mobility.

4. It reduces transit time.

61

Page 62: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

COLLEGE PROFILE:

B--------- V------------- College of Engineering is an engineering college located at India. Its parent body is University, and it shares its infrastructure with Institute of Computers and management It is affiliated with---------. It is one of the leading engineering colleges in. The institute conducts training programme in collaboration with leading multinational company in the areas of VLSI & Embedded Systems. The institute also conducts in-plant training programme for the students in view of the campus recruitment programmes attempted to match the aspirations of the future with the expectations of the corporate sector.

It offers the B.Tech engineering degree in the following streams:

1. Electronics & Communication Engineering - 120

2. Computer Science & Engineering - 60

3. Information Technology Engineering - 60

4. Electrical & Electronics Engineering - 60

5. Instrumentation & Control Engineering – 60

62

Page 63: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

BIBLIOGRAPHY:

2.CISCO’S CCNA all modules for networking information.

3. VIRTUAL PRIVATE NETWORKS:TECHNOLOGIES AND SOLUTIONS & VIRTUAL PRIVATE NETWORKS:MAKING THE RIGHT CONNECTION books for VPN related stuff.

http://www.inoc.nic.in

http://www.vpnserver.nic.in

http://www.vpn-info.com/disadvantages_of_vpn.htm

http://en.wikipedia.org/wiki/VPN

63

Page 64: DECLARATION -  · PDF file · 2011-11-30DECLARATION This is to certify ... mesh network, star-bus network, tree or ... logical network topology is not necessarily the same as the

INDEX

Topics Page no.

1) ABSTRACT 1

2) INTRODUCTION OF VPN 28

3) HISTORY OF VPN 31

4) DIFFERENT TYPES OF VPN 36

5) TECHNOLOGIES SUPPORTED BY VPN 42

6) PROTOL USED 47

7) ADVANTAGES AND DISADVANTAGES OF VPN 59

8) LIMITATIONS 62

9) FUTURE EXPANSION 65

10) CONCLUSION 66

11)ORGANISATION PROFILE 68

12) COLLEGE PROFILE 73

13)BIBLIOGRAPHY 76

64