VPN. Agenda VPN VPDN. L84 - VPN and VPDN in IP. Virtual Private Networks Introduction VPDN Details (L2F, PPTP, L2TP)

Similar documents
ITTK - Network Integration and Implementation - WS L03 - WAN Design

Institute of Computer Technology - Vienna University of Technology. L103 - WAN Design

Virtual Private Networks (VPNs)

L2TP Configuration. L2TP Overview. Introduction. Typical L2TP Networking Application

VPN. Virtual Private Network. Mario Baldi. Synchrodyne Networks, Inc. VPN - 1 M.

Multiprotocol BGP 1 MPLS VPN. Agenda. Multiprotocol BGP 2

I. Goyret, Ed. Lucent Technologies March Layer Two Tunneling Protocol - Version 3 (L2TPv3)

A device that bridges the wireless link on one side to the wired network on the other.

CS 393 Network Security. Nasir Memon Polytechnic University Module 13 Virtual Private Networks

Configuring L2TP over IPsec

Network Working Group

Configuring Virtual Private Networks

IP Tunneling. GRE Tunnel IP Source and Destination VRF Membership. Tunnel VRF CHAPTER

Configuring Client-Initiated Dial-In VPDN Tunneling

Microsoft Privacy Protected Network Access: Virtual Private Networking and Intranet Security

RADIUS Attributes. RADIUS IETF Attributes

Configuring Additional VPDN Features

thus, the newly created attribute is accepted if the user accepts attribute 26.

isco Cisco PPPoE Baseline Architecture for the Cisco UAC

Securizarea Calculatoarelor și a Rețelelor 32. Tehnologia MPLS VPN

Cisco How Virtual Private Networks Work

VPN. Virtual Private Network. Mario Baldi Luigi Ciminiera. Politecnico di Torino. VPN - 1 M. Baldi L. Ciminiera: see page 2

RADIUS Tunnel Attribute Extensions

Cisco PPPoE Baseline Architecture for the Cisco UAC 6400

PPPoA Baseline Architecture

MPLS VPN. 5 ian 2010

Virtual Private Networks.

RADIUS Vendor-Specific Attributes (VSA) and RADIUS Disconnect-Cause Attribute Values

Chapter 10 Security Protocols of the Data Link Layer

RADIUS Attribute 66 Tunnel-Client-Endpoint Enhancements

Review on protocols of Virtual Private Network

HIP Host Identity Protocol. October 2007 Patrik Salmela Ericsson

VPDN Tunnel Management

thus, the newly created attribute is accepted if the user accepts attribute 26.

RADIUS Tunnel Preference for Load Balancing

RADIUS Vendor-Specific Attributes and RADIUS Disconnect-Cause Attribute Values

Configuring Security on the GGSN

Per VRF AAA. Finding Feature Information. Last Updated: January 18, 2012

QoS: Per-Session Shaping and Queuing on LNS

SonicWALL Addendum. A Supplement to the SonicWALL Internet Security Appliance User's Guide

Internet. 1) Internet basic technology (overview) 3) Quality of Service (QoS) aspects

L2TP Tunnel Setup and Teardown

HC-711 Q&As. HCNA-CBSN (Constructing Basic Security Network) - CHS. Pass Huawei HC-711 Exam with 100% Guarantee

Cisco Technologies, Routers, and Switches p. 1 Introduction p. 2 The OSI Model p. 2 The TCP/IP Model, the DoD Model, or the Internet Model p.

Virtual Private Networks Advanced Technologies

Virtual private networks

CS519: Computer Networks. Lecture 8: Apr 21, 2004 VPNs

Provisioning Broadband Aggregators Topics

Network Security. Chapter 10 Security Protocols of the Data Link Layer

DPX8000 Series Deep Service Switching Gateway User Configuration Guide Firewall Service Board Module v1.0

ETSF05/ETSF10 Internet Protocols Network Layer Protocols

Network Working Group. Category: Standards Track September 2006

L2TP over IPsec. About L2TP over IPsec/IKEv1 VPN

Autosense for ATM PVCs and MUX SNAP Encapsulation

Virtual Private Networks Advanced Technologies

Hillstone IPSec VPN Solution

IP Overlapping Address Pools

Operation Manual Security. Table of Contents

IP and Network Technologies. IP over WAN. Agenda. Agenda

Protocol Architecture (2) Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Virtual Private Networks

CCNP 2: Remote Access

TCP/IP Networking. Training Details. About Training. About Training. What You'll Learn. Training Time : 9 Hours. Capacity : 12

Server Operating System

Networking interview questions

RADIUS Logical Line ID

The router sends hello keepalive packets at 60 second intervals.

VPN World. MENOG 16 Istanbul-Turkey. By Ziad Zubidah Network Security Specialist

xdsl OVERVIEW OF IMPORTANT DIGITAL SUBSCRIBER LINE TECHNOLOGIES xdsl Technology Peter R. Egli peteregli.net peteregli.net 1/18 Rev. 3.

HPE FlexNetwork MSR Router Series

GLOSSARY. See ACL. access control list.

IPv6 Switching: Provider Edge Router over MPLS

Network Configuration Example

Cisco IOS VPDN Command Reference

Remote Access MPLS-VPNs

BGP MPLS VPNs. Introduction

CCNA 4 - Final Exam (A)

Index. Numerics 3DES (triple data encryption standard), 21

Special expressions, phrases, abbreviations and terms of Computer Networks

Configuring Virtual Private LAN Services


Managing Site-to-Site VPNs: The Basics

Table of Contents. Cisco MPLS FAQ For Beginners

A-B I N D E X. backbone networks, fault tolerance, 174

Network Design with latest VPN Technologies

Configuring MPLS and EoMPLS

Define TCP/IP and describe its advantages on Windows Describe how the TCP/IP protocol suite maps to a four-layer model

Multiprotocol Label Switching (MPLS) on Cisco Routers

Cisco Group Encrypted Transport VPN

Computer Networks (Introduction to TCP/IP Protocols)

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

HP MSR Router Series. Layer 2 - WAN Access Configuration Guide(V7)

Analysis of VPN Protocols

HP VSR1000 Virtual Services Router

2001, Cisco Systems, Inc. All rights reserved. Copyright 2001, Cisco Systems, Inc. All rights reserved. Printed in USA. Presentation_ID.

MPLS in the DCN. Introduction CHAPTER

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August

HP MSR Router Series. Layer 2 - WAN Access Configuration Guide(V7)

ND1009:2002/05 PNO-ISC/SPEC/009

HUAWEI USG6000 Series Next-Generation Firewall Technical White Paper VPN HUAWEI TECHNOLOGIES CO., LTD. Issue 1.1. Date

Transcription:

VPN Virtual Private Networks Introduction VPDN Details (L2F, PPTP, L2TP) Agenda VPN Classical Approach Overview IP Based Solutions IP addresses non overlapping IP addresses overlapping MPLS-VPN VPDN RAS Primer and VPN Dialup Issues L2F PPTP L2TP VPN Intro + VPDN, v4.3 2 Page 84-1

Virtual Private Networks (VPN) old idea private networks of different customers can share a single WAN infrastructure since 1980 s public switched data networks (PSDN) were offered by providers (e.g. PTTs) to give open access to subscribers of a PSDN to interconnect parts of a physically separated private network do you remember closed user group of X.25 closed user group of ISDN PVC-DLCI s of Frame relay PVC-VPI/VCI s of ATM private subnetwork (customer gateway) and public MAN service (edge gateway) of MAN -> closed user group of MAN (Metropolitan Area Network based on 802.6 DQDB) VPN Intro + VPDN, v4.3 3 Classical VPN s X.25, Frame Relay or ATM in the core dedicated physical switch ports for every customers CPE router, bridge, computer customer traffic separation in the core done by concept of virtual circuit PVC service management overhead SVC service with closed user group feature signaling overhead separation of customers inherent to virtual circuit technique privacy is aspect of customer in most cases overlooked VPN s based on Overlay Model VPN Intro + VPDN, v4.3 4 Page 84-2

Physical Topology of Classical VPN Location A0 Location B0 WAN Switches Location B3 Location A1 Location A3 Location B1 Location A2 Location B2 VPN Intro + VPDN, v4.3 5 Logical Topology Classic VPN (1) Location A0 Location B0 Hub and Spoke Partial Mesh Location B3 Location A1 Location A3 Location B1 Location A2 Location B2 VPN Intro + VPDN, v4.3 6 Page 84-3

Logical Topology Classic VPN (2) Location A0 Location B0 Full Mesh Location B3 Location A1 Location A3 Location B1 Location A2 Location B2 VPN Intro + VPDN, v4.3 7 Agenda VPN Classical Approach Overview IP Based Solutions IP addresses non overlapping IP addresses overlapping MPLS-VPN VPDN RAS Primer and VPN Dialup Issues L2F PPTP L2TP VPN Intro + VPDN, v4.3 8 Page 84-4

Virtual Private Networks based on IP single technology end-to-end IP forwarding and IP routing no WAN switches in the core based on different technology (X.25, FR or ATM) administered by different management techniques but accounting and quality of service just coming in the IP world X.25, FR and ATM have it already often private means cases control over separation but not privacy data are seen in clear-text in the core encryption techniques can solve this problem but encryption means must be in the hand of the customer VPN s based on Peer Model VPN Intro + VPDN, v4.3 9 Physical Topology IP VPN Location A0 Location B0 PE PE Customer Edge Provider Edge PE Core Router P Location B3 Location A1 PE PE Location A3 Location B1 Location A2 Location B2 VPN Intro + VPDN, v4.3 10 Page 84-5

Possible Solutions for IP VPN s IP addresses of customers non overlapping filtering and policy routing techniques can be used in order to guarantee separation of IP traffic exact technique depends on who manages routes at the customer site IP addresses of customers overlapping tunneling techniques must be used in order to guarantee separation of IP traffic GRE L2F, PPTP, L2TP MPLS-VPN If privacy is a topic encryption techniques must be used SSL/TLS, IPsec VPN Intro + VPDN, v4.3 11 Tunneling Solutions for IP VPN s Tunneling techniques are used in order to guarantee separation of IP traffic IP in IP Tunneling or GRE (Generic Routing Encapsulations) Bad performance on PE router PPTP or L2TP for LAN to LAN interconnection Originally designed for PPP Dial-up connections LAN LAN is just a special case MPLS-VPN Best performance on PE router In all these cases Privacy still an aspect of the customer VPN Intro + VPDN, v4.3 12 Page 84-6

Tunneling IP VPNs without Encryption Company A Company A Internet Company A Company A Company A Virtual Private Network (VPN) (tunneling between customer edge routers e.g. GRE) Virtual Private Network (VPN) (tunneling between PE routers of ISP provider e.g. MPLS VPN) VPN Intro + VPDN, v4.3 13 Encryption Solutions for IP VPN s If privacy is a topic tunneling techniques with encryption are used in order to hide IP traffic SSL (secure socket layer) Usually end-to-end Between TCP and Application Layer IPsec Could be end-to-end Could be between special network components (e.g. firewalls, VPN concentrators) only Between IP and TCP/UDP Layer PPTP and L2TP Tunnels With encryption turned on via PPP option VPN Intro + VPDN, v4.3 14 Page 84-7

Tunneling IP VPNs without Encryption Company A Company A Internet Company A Company A Virtual Private Network (VPN) (encryption between customer edge routers or border firewalls e.g. IPsec) Virtual Private Network (VPN) (encryption between IP hosts e.g. SSL/TLS, IPsec) VPN Intro + VPDN, v4.3 15 SSL/TLS versus IPsec Application must be aware of new application programming interface Application can use standard application programming interface Application Application new API SSL / TLS TCP IP Lower Layers Application OS TCP IPsec IP Lower Layers standard API VPN Intro + VPDN, v4.3 16 Page 84-8

Agenda VPN Classical Approach Overview IP Based Solutions IP addresses non overlapping IP addresses overlapping MPLS-VPN VPDN RAS Primer and VPN Dialup Issues L2F PPTP L2TP VPN Intro + VPDN, v4.3 17 Physical Topology IP VPN Location A0 Location B0 Customer Edge Provider Edge PE Core Nodes CN Location B3 Location A1 Location A3 Location B1 Location A2 Location B2 VPN Intro + VPDN, v4.3 18 Page 84-9

IP Addressing non overlapping (1) one IP address space in the core and at the customer sites one routing domain dynamic routing protocols in the core transport network information about all customer networks and all core networks challenge for the provider to give every customer only network information about own networks to discard packets with wrong destination address coming from a given customer several ways to achieve depending on the control of the routers at the customer site VPN Intro + VPDN, v4.3 19 IP Addressing non overlapping (2) 176.16.1.0 176.17.1.0 PE PE PE 176.17.4.0 PE PE 176.16.2.0 176.16.4.0 176.17.2.0 176.16.3.0 176.17.3.0 VPN Intro + VPDN, v4.3 20 Page 84-10

IP Addressing non overlapping (3) 176.16.1.0 176.17.1.0 Routing Table 176.17.1.0-176.17.4.0 Routing Table 176.16.1.0-176.16.4.0 Routing Table Core 176.16.1.0-176.16.4.0 176.17.1.0-176.17.4.0 176.17.4.0 176.16.2.0 176.16.4.0 176.17.2.0 176.16.3.0 176.17.3.0 VPN Intro + VPDN, v4.3 21 Routers under different control (1) router controlled by customer: routing: static routing to the core or dynamic routing to the core (no default route) data packet filtering: (incoming packets concerning source and destination address) ( ) can be done because of security reasons static routes and data packet filtering means administrative overhead at the customer site default routing problem e.g. for Internet connectivity must be solved by tunneling VPN Intro + VPDN, v4.3 22 Page 84-11

Routers under different control (2) PE router controlled by provider: routing: dynamic routing in the core static routing to the customer with route redistribution of static routes into the core or dynamic routing with route filtering to the customer data packet filtering: incoming packets concerning source and destination address static routes / dynamic routing with route filtering and data packet filtering means big administrative overhead at the provider site and have performance impacts on PE routers VPN Intro + VPDN, v4.3 23 All routers under provider control (1) router at the customer site: routing: dynamic routing to the core no default route PE router routing: dynamic routing in the core dynamic routing with route filtering to the customer for the provider less administrative overhead than routers under different control VPN Intro + VPDN, v4.3 24 Page 84-12

All routers under provider control (2) special case if two customers are merged at the customer edge and not at the distribution or core area this router needs full information about all networks in order to forward packets to all destinations therefore separation of customers based on different routing tables is not possible hence data packet filtering is necessary based on incoming packets concerning source and destination address VPN Intro + VPDN, v4.3 25 Agenda VPN Classical Approach Overview IP Based Solutions IP addresses non overlapping IP addresses overlapping MPLS-VPN VPDN RAS Primer and VPN Dialup Issues L2F PPTP L2TP VPN Intro + VPDN, v4.3 26 Page 84-13

IP Addressing overlapping (1) separated IP address spaces in the core and at the customer sites needs either NAT at solutions are the same as with non overlapping addresses or different routing domains dynamic routing protocols in the core are independent from dynamic routing protocols of the customer networks challenge for the provider to separate routing domains several ways to achieve depending on the control of the routers at the customer site VPN Intro + VPDN, v4.3 27 IP Addressing overlapping (2) 176.16.1.0 176.16.1.0 PE PE PE 176.16.4.0 PE PE 176.16.2.0 176.16.4.0 176.16.2.0 176.16.3.0 176.16.3.0 VPN Intro + VPDN, v4.3 28 Page 84-14

IP Addressing overlapping Scenario 1 176.16.1.0 176.16.1.0 Tunnel for 176.16.4.0 176.16.2.0 176.16.4.0 176.16.2.0 176.16.3.0 176.16.3.0 Tunnel for VPN Intro + VPDN, v4.3 29 Routers under different control (1) routers controlled by customer: routing: static routing to the core or dynamic routing to the core data packet filtering can be done because of security reasons incoming packets concerning source and destination address default routing e.g. for Internet connectivity can be solved in accordance with the provider by a special tunnel to the Internet exit point VPN Intro + VPDN, v4.3 30 Page 84-15

Routers under different control (2) PE routers controlled by provider: dynamic routing in the core for knowing about tunnelendpoints ip policy routing traffic from a given interface can be forwarded only to certain tunnels depending on the destination address a next hop is set next hop points to a specific tunnel for unknown destinations next hop is set to null0 interface these packets are discarded tunneling and ip policy routing administrative overhead at the provider site performance and scalability impacts VPN Intro + VPDN, v4.3 31 IP Addressing overlapping Scenario 2 176.16.1.0 176.16.1.0 Tunnel for 176.16.4.0 176.16.2.0 176.16.4.0 176.16.2.0 176.16.3.0 176.16.3.0 Tunnel for VPN Intro + VPDN, v4.3 32 Page 84-16

All routers under provider control routers at the customer site: routing: dynamic routing to the core for knowing about tunnel-endpoints static routes to all customer destinations to find the right tunnel or dynamic routing to all customer destinations second dynamic routing process information is not given to the core PE routers dynamic routing in the core will not see customer networks VPN Intro + VPDN, v4.3 33 Result: Routing Domain for 176.16.1.0 Routing Domain Core Routing Domain 176.16.2.0 176.16.4.0 176.16.3.0 VPN Intro + VPDN, v4.3 34 Page 84-17

Result: Routing Domain for Routing Domain 176.16.1.0 Core Routing Domain 176.16.4.0 176.16.2.0 176.16.3.0 VPN Intro + VPDN, v4.3 35 Agenda VPN Classical Approach Overview IP Based Solutions IP addresses non overlapping IP addresses overlapping MPLS-VPN VPDN RAS Primer and VPN Dialup Issues L2F PPTP L2TP VPN Intro + VPDN, v4.3 36 Page 84-18

MPLS-VPN 176.16.1.0 PE PE 176.16.1.0 MPLS-Path (= Tunnel) for IP Network with MPLS-Switching plus MPLS- Application VPN PE 176.16.4.0 176.16.2.0 PE PE 176.16.4.0 176.16.2.0 176.16.3.0 176.16.3.0 MPLS-Path (= Tunnel) for VPN Intro + VPDN, v4.3 37 MPLS VPN Best of Both Worlds Combines VPN Overlay model with VPN Peer model PE routers allow route isolation By using Virtual Routing and Forwarding Tables (VRF) for differentiating routes from the customers Allows overlapping address spaces PE routers participate in P-routing Hence optimum routing between sites Label Switches Paths are used within the core network Easy provisioning (sites only) Overlapping VPNs possible By a simple (?) attribute syntax VPN Intro + VPDN, v4.3 38 Page 84-19

What does MPLS VPN mean for the Provider? Requires MPLS Transport within the core Using the label stack feature of MPLS Requires MP-BGP among PE routers Supports IPv4/v6, VPN-IPv4, multicast Default behavior: BGP-4 Requires VPN-IPv4 96 bit addresses 64 bit Route Distinguisher (RD) 32 bit IP address Every PE router uses one VRF for each VPN Virtual Routing and Forwarding Table (VRF) VPN Intro + VPDN, v4.3 39 Agenda VPN Classical Approach Overview IP Based Solutions IP addresses non overlapping IP addresses overlapping MPLS-VPN VPDN RAS Primer and VPN Dialup Issues L2F PPTP L2TP VPN Intro + VPDN, v4.3 40 Page 84-20

most of today s company networks are based on one or more of protocol techniques like IP, IPX, NetBios, AppleTalk, etc private addresses several network access principles constant connectivity router/switches/leased lines dial on demand connectivity access server/security server/isdn-pstn if network technology and network applications of a company network are based on TCP/IP protocol suite we call such a network INTRANET VPN Intro + VPDN, v4.3 41 WWW E-Mail Name Security ISDN/PSTN VPN Intro + VPDN, v4.3 42 Page 84-21

RAS techniques for s lets talk about remote access techniques first functionality handled by remote clients, access server and security server PPP protocol (RFC 1661, 1662) PPP authentication methods CHAP (RFC 1994) PAP (RFC 1334) these basic techniques are used by ISP and s encryption methods end-to-end (IPsec; RFC 1825-1829) end-to-access server (PPP encryption; draft-ietf-pppext-desencrypt-v2-00.txt, RFC 1968, 2419, 2420) in both cases remote PC must deal with encryption in order to achieve privacy! VPN Intro + VPDN, v4.3 43 RAS Operation 1 Security remote PC places ISDN call to access server, ISDN link is established (1) 1) ISDN VPN Intro + VPDN, v4.3 44 Page 84-22

RAS Operation 2 2c) Security 2a), 2b) PPP link (multiprotocol over serial line) is established LCP (2a) authentication CHAP (2b) verification done by central security server (2c) ISDN VPN Intro + VPDN, v4.3 45 RAS Operation 3 Security ISDN 3) virtual interface PPP NCP assigns IP address to remote PC remote PC appears as device reachable via virtual interface (3) optionally filter could be established on that virtual interface authorization accounting can be performed actually done by security server (AAA server) TACACS, TACACS+ Radius VPN Intro + VPDN, v4.3 46 Page 84-23

RAS Operation 4 Security 4b) privacy on ISDN PPP encryption between remote PC and access server (4a) privacy end-to-end IPsec efforts based on additional encryption header between IP and higher layers (4b) 4a) ISDN VPN Intro + VPDN, v4.3 47 Internet access to the Internet: firewall to secure against hacker attacks firewall to provide necessary connectivity for communication between hosts and other hosts located in the Internet address translation to map certain private addresses to official IP addresses and vice versa NAT network address translation gateway firewall and NAT could be one box but firewalls do not replace end system security can compensate some weaknesses of end systems VPN Intro + VPDN, v4.3 48 Page 84-24

to Internet Firewall Addr. Transl. ISP Internet VPN Intro + VPDN, v4.3 49 A Possible Firewall Architecture private IP addresses WWW SMTP DNS Packet Level Firewall demilitarized zone ISDN/PSTN official IP addresses Packet Level Firewall INTERNET Bastion Host (Application Level Firewall) VPN Intro + VPDN, v4.3 50 Page 84-25

VPN Purpose Customer connectivity deployed on a shared infrastructure with the same policies as a private network SP Shared Network Internet, IP, FR, ATM VPN VPN Intro + VPDN, v4.3 51 IP VPN Technologies Two major IP VPN implementations Peer to Peer VPN, Service provider takes part in customer routing e.g. MPLS Overlay VPN based on IP infrastructure, uses additional encapsulation technique to simulate virtual point to point connections between customer sites e.g. GRE, IPSEC, L2TP, PPTP, etc VPN Intro + VPDN, v4.3 52 Page 84-26

VPDN Terminology VPDN Virtual Private Dial-up Networks When L2TP, L2F or PPTP are used to establish a virtual private connection accross remote access (dial-up) networks VPN Intro + VPDN, v4.3 53 VPDN Overview Home Lan Home Gateway Remote User ISDN ISP Cloud PSTN Remote User VPN Intro + VPDN, v4.3 54 Page 84-27

VPN in a Dial-Up Environment what is really new with VPN and Internet? we have to look to the remote access part of a company s costs of long distance calls aspects of administration and security user convenience remote access is one of the fastest growing areas of information technology mobility home office costs of telephone circuits answer: VPN in a dial up scenario -> VPDN VPN Intro + VPDN, v4.3 55 Dial up Scenario Remote ISP Internet Firewall Addr. Transl. POP ISDN/PSTN Security short distance call official IP address long distance call private IP address ISDN/PSTN VPN Intro + VPDN, v4.3 56 Page 84-28

VPDN Challenge User Aspects ISP Internet Firewall Addr. Transl. POP short distance call with private IP address ISDN/PSTN VPDN between remote host and home-gateway ISDN/PSTN Security VPN Intro + VPDN, v4.3 57 VPDN Challenge Provider Aspects Internet Firewall Addr. Transl. POP packet switching (statistical multiplexing) ISDN/PSTN of Provider X Security short distance call to relieve ISDN of data circuits circuit switching (synchronous multiplexing) VPN Intro + VPDN, v4.3 58 Page 84-29

VPN and Dial Up basic idea of VPN in a dial up environment extension of local PPP sessions between remote client and ISP to the native entry point of the (access server) this is done by encapsulation of PPP packets into IP several methods developed and deployed L2F Layer Two Forwarding Protocol (Cisco; RFC 2341) PPTP Point-to-Point Tunneling Protocol (Microsoft; RFC 2637) finally efforts to combine these proposals lead in L2TP Layer Two Tunneling Protocol (RFC 2661) VPN Intro + VPDN, v4.3 59 Layer 2 Overlay VPN Technologies IP PPP Layer 2 Tunnel Protocol (L2TP) Layer 2 Forwarding Protocol (L2F Protocol) IP Point-to-Point Tunnelling Protocol (PPTP) Used to transport PPP frames across a shared infrastructure, to simulate virtual point to point connections VPN Intro + VPDN, v4.3 60 Page 84-30

PPP extension Security ISP Internet Firewall Addr. Transl. POP short distance call ISDN/PSTN PPP session between remote host and home-gateway ISDN/PSTN Security virtual interface VPN Intro + VPDN, v4.3 61 Agenda VPN Classical Approach Overview IP Based Solutions IP addresses non overlapping IP addresses overlapping VPDN RAS Primer and VPN Dialup Issues L2F PPTP L2TP VPN Intro + VPDN, v4.3 62 Page 84-31

L2F Overview Protocol, created by Cisco Not a Standard Defined in RFC 2341, May 1998 Tunnelling of the Link Layer over Higher layer Protocols VPN Intro + VPDN, v4.3 63 L2F Security 3) ISP Internet Firewall NAT POP 1), 2) ISDN L2F Tunnel 4) home-gateway Security remote-pc 1) short distance ISDN call 2) PPP session setup between remote-pc and access server of ISP 3) username of CHAP used for mapping user to its VPDN (IP address of home-gateway) 4) L2F Tunnel established between ISP access server and home-gateway VPN Intro + VPDN, v4.3 64 Page 84-32

L2F Security ISP Internet Firewall NAT POP ISDN 5) L2F Tunnel home-gateway 6) Security remote-pc 7) 5) encapsulation of all traffic from remote-pc into L2F Tunnel an vice versa 6) CHAP (authentication) proceeded between remote-pc and of home-gateway (security server) 7) assignment of IP address out of the pool of private addresses VPN Intro + VPDN, v4.3 65 L2F Security 3) ISP Internet Firewall NAT POP 8) ISDN home-gateway Security remote-pc 9) 8) PPP session end-to-end 9) remote-pc becomes part of private authentication CHAP between ISP and home-gateway and vice versa may be used optionally during tunnel establishment to handle spoofing attacks privacy (encryption) not handled by L2F!!!! VPN Intro + VPDN, v4.3 66 Page 84-33

L2F Encapsulation remaining IP Header source address destination address private IP addr. remote-pc private IP addr. remote IP host IP Payload PPP Header PPP Payload remote IP host home-gateway L2F Header L2F Payload ISP access server home-gateway remaining IP Header official IP addr. ISP access server official IP addr. home-gateway UDP Header ISP access server NAT-gateway UDP Payload VPN Intro + VPDN, v4.3 67 L2F Facts ISP provider must know the home-gateway of a certain user ISP provider must establish and maintain L2F tunnel different remote-clients are distinguished by Multiplex ID remote PC must know about ISDN number of local ISP POP remote PC becomes part of private VPN Intro + VPDN, v4.3 68 Page 84-34

L2F Facts NAT and firewall must allow communication between ISP access server and home-gateway L2F supports incoming calls only end system transparency neither the remote end system nor its home-site servers requires any special software to use this service VPN Intro + VPDN, v4.3 69 Agenda VPN Classical Approach Overview IP Based Solutions IP addresses non overlapping IP addresses overlapping VPDN RAS Primer and VPN Dialup Issues L2F PPTP L2TP VPN Intro + VPDN, v4.3 70 Page 84-35

PPTP Overview Created by a Vendor Consortium US-Robotics, Microsoft, 3COM, Ascend and ECI Telematics Supports multiprotocol VPNs with 40 and 128-bit encryption using Microsoft Point-to-Point Encryption (MPPE) Not a Standard RFC 2637,July 1999 Tunnelling of PPP over IP network A Client-Sever Architecture VPN Intro + VPDN, v4.3 71 PPTP Security 3) ISP Internet Firewall NAT POP 1), 2) remote-pc ISDN 4), 5) home-gateway 1) short distance ISDN call 2) PPP session setup between remote-pc and access server of ISP 3) username and challenge of CHAP used for user authentication 4) official IP address assigned by ISP for remote-pc 5) PPP session fully established between remote-pc and ISP access server Security VPN Intro + VPDN, v4.3 72 Page 84-36

PPTP Security ISP Internet Firewall NAT POP ISDN PPTP Tunnel 6) PPTP network server (PNS) 7) Security PPTP access concentrator (PAC) 6) PPTP Tunnel established between PAC and PNS 7) authentication performed between PAC and PNS (security server) VPN Intro + VPDN, v4.3 73 PPTP Security ISP Internet Firewall NAT POP PPTP access concentrator (PAC) ISDN 10) PPTP Tunnel PPTP network server (PNS) Security VPN Intro + VPDN, v4.3 74 8) 9) 8) PPTP control messages are carried on top of a TCP session between PAC and PNS (responsible for call setup and tear down Call ID) 9) PPTP data messages contains PPP encapsulated in IP & enhanced GRE 10) private address must be assigned additionally by PNS to allow PAC to join the Page 84-37

PPTP and ISP Security ISP Internet Firewall NAT POP PPTP Tunnel ISDN PPTP access concentrator (PAC) (Microsoft calls this function FEP) home-gateway Security PPP Link remote-pc VPN Intro + VPDN, v4.3 75 PPTP Encapsulation Data remaining IP Header source address destination address private IP addr. PAC private IP addr. PAC IP Payload contains Call-ID PPP Header GRE Header PAC PNS PPP Payload GRE Payload PAC PNS remaining IP Header official IP addr. PAC official IP addr. PNS PAC NAT-gateway IP Payload VPN Intro + VPDN, v4.3 76 Page 84-38

PPTP Encapsulation Control PPTP Control Message TCP Header TCP Payload PAC PNS-gateway remaining IP Header official IP addr. PAC official IP addr. PNS IP Payload PAC NAT-gateway VPN Intro + VPDN, v4.3 77 PPTP Facts remote PC must know about ISDN number of local ISP POP and will be assigned a official IP address private addresses are used message-internal to reach server NAT and Firewall must allow communication between any PAC and PNS that means more overhead than L2F at NAT and Firewall PPTP may be used for incoming and outgoing calls VPN Intro + VPDN, v4.3 78 Page 84-39

PPTP Facts PPTP can be used for direct LAN-to-LAN connectivity without Dial on Demand Microsoft VPN encryption may be performed on PPTP data tunnel end-to-end (PAC to PNS) end system transparency is not given if remote-pc performs function of a PAC VPN Intro + VPDN, v4.3 79 Agenda VPN Classical Approach Overview IP Based Solutions IP addresses non overlapping IP addresses overlapping VPDN RAS Primer and VPN Dialup Issues L2F PPTP L2TP VPN Intro + VPDN, v4.3 80 Page 84-40

L2TP Overview Protocol developed by the PPTP forum, Cisco and the IETF A Proposed Standard Defined in RFC 2661, August 1999 Transparent Tunnelling of PPP over Intervening Network Supports IPSec encryption VPN Intro + VPDN, v4.3 81 L2TP follows the basic ideas of L2F end system transparency only private address at remote-pc assigned adapts PAC / PNS terminology and concept of Control / Data messages of PPTP LAC = L2TP Concentrator ISP access server LNS = L2TP Network home-gateway call establishment (assignment of CALL-ID), call management and call tear-down procedures sounds a little bit like ISDN Signaling Q.931 VPN Intro + VPDN, v4.3 82 Page 84-41

L2TP control messages and payload messages operates over a given tunnel in parallel L2TF will be encapsulated in UDP or mapped to PVC or SVC control messages are carried reliable retransmission based on sequence numbers AVP (attribute value pairs) technique is used for control message format CALL-ID used for multiplexing of different calls over the same tunnel control messages can be sent in a secure way using MD5 hash as kind of digital signature tunnel peers must be authenticated by additional CHAP procedure between LNS and LAC before VPN Intro + VPDN, v4.3 83 L2TP different tunnels may be used between a given LAC / LNS pair for implementing different QoS for different users optionally flow control techniques can be implemented to perform congestion control over the tunnel support of accounting at LNS and LAC site can be used for incoming and outgoing calls integrity of payload messages not covered by L2TP still an end-to-end issue VPN Intro + VPDN, v4.3 84 Page 84-42

L2TP Security ISP Internet Firewall NAT POP L2TP access concentrator (LAC) 7) ISDN 5) L2TP Tunnel L2TP network outgoing and incoming server (LNS) calls allowed (more sophisticated call management) Security remote-pc PPP Traffic (remote-pc becomes part of private address space of ) VPN Intro + VPDN, v4.3 85 L2TP Terminology Home LAN LNS L2TP Tunnel Switch ISDN PSTN Remote System LAC ISP Cloud NAS LAC Client VPN Intro + VPDN, v4.3 86 Page 84-43

L2TP devices L2TP Network (LNS) The LNS is the logical termination point of a PPP session that is tunnelled from a remote system using L2TP encapsulation L2TP Concentrator (LAC) Is a L2TP peer to the LNS A LAC process could be run on a NAS or on a client PC itself Network (NAS) Provides network access to users across a remote access network e.g. PSTN VPN Intro + VPDN, v4.3 87 L2TP Overview Layer2 Multiprotocol Transport IP WS L2TP tunnel IP WS IPX Client POP ISP Home Gateway AppleTalk Client L2TP Tunnel VPN Intro + VPDN, v4.3 88 Page 84-44

L2TP Tunnel Possibilities 1 Home Lan LNS L2TP Tunnel Remote@company.at ISDN PSTN Remote User LAC ISP Cloud NAS LAC Client VPN Intro + VPDN, v4.3 89 L2TP Tunnel Possibilities 2 Home Lan LNS L2TP Tunnel Remote@company.at L2TP Tunnel Account to a public ISP ISDN PSTN Remote User LAC ISP Cloud NAS LAC Client VPN Intro + VPDN, v4.3 90 Page 84-45

L2TP Messages Types L2TP utilizes two types of messages Control Messages Used for the establishment, maintenance and clearing of L2TP tunnels Are transported across a reliable control channel Data Messages In L2TP encapsulated PPP frames Are not retransmitted when a packet loss occurs VPN Intro + VPDN, v4.3 91 L2TP Structure PPP Frames L2TP Data Messages L2TP Data Channel (unreliable) L2TP Control Messages L2TP Control Channel (reliable) Packet Transport (UDP, FR, ATM, etc.) VPN Intro + VPDN, v4.3 92 Page 84-46

L2TP Header Format 1 8 16 T L X X S X O P X X X Length (optional) Tunnel ID Session ID Ns (optional) Nr (optional) Offset Size (optional) X Ver Offset padding... (variable, optional) VPN Intro + VPDN, v4.3 93 L2TP Control Bits Type (T) bit Indicates type of message 0 = data message, 1 = control message Length (L) bit L = 1 means length field present, must be set to 1 in control messages X bits Are reserved for future use Sequence (S) bit S = 1 indicate the presence of the Nr and Ns counters, must be 1 in control messages Offset (O) bit O = 1 indicate the presence of the offset field, must be 0 in control messages Priority (P) bit P = 1 indicates preferential treatment, typically used in data messages VPN Intro + VPDN, v4.3 94 Page 84-47

L2TP Header Fields Length field Indicates the total length of the message in bytes Tunnel ID Identifier for Control Connection Only Locally Significant Session ID Identifier for Session in the Tunnel Only Locally Significant Nr Sequence Number Used to Acknowledge received control messages Ns Sequence Number Send Sequence number of actual control message Offset Field Indicates the start of the payload data VPN Intro + VPDN, v4.3 95 Types of Control Messages Control Connection Management 0 Reserved 1 2 3 4 SCCRQ SCCRP SCCCN StopCCN Start-Control-Connection-Request Start-Control-Connection-Reply Start-Control-Connection-Connected Stop-Control-Connection-Notification 5 Reserved 6 HELLO Hello VPN Intro + VPDN, v4.3 96 Page 84-48

Types of Control Messages Call Management 7 OCRQ Outgoing-Call-Request 8 9 10 11 12 OCRP OCCN ICRQ ICRP ICCN Outgoing-Call-Reply Outgoing-Call-Connected Incoming-Call-Request Incoming-Call-Reply Incoming-Call-Connected 13 Reserved 14 CDN Call-Disconnect-Notify 15 16 WEN SLI Error Reporting WAN-Error-Notify PPP Session Control Set-Link-Info VPN Intro + VPDN, v4.3 97 AVP Control Message extensions AVP Attribute Value Pair Used to exchange and negotiate more detailed L2TP session related information e.g. Window size, Host names, call serial number etc. Uniform method for encoding message types and payload Several Well Known AVPs are defined VPN Intro + VPDN, v4.3 98 Page 84-49

AVP Format 1 8 16 M H Reserved (4) Length (10) Vendor ID Attribute Type Attribute Value... (variable till length is reached) VPN Intro + VPDN, v4.3 99 AVP Bits Mandatory (M) bit Controls the Behaviour for Unrecognized AVPs Hidden (H) bit Responsible for Hiding Data of AVP Length field Defines the Number of Octets in AVP Vendor ID ID = 0 indicates IETF standardized AVP types VPN Intro + VPDN, v4.3 100 Page 84-50

Some of Well Known AVPs Message Type Random Vector Result Code Protocol Version Framing Capabilities Bearer Capabilities Bearer Type Tie Breaker Firmware Revision Host Name Vendor Name Assigned Tunnel ID Receive Window Size Challenge Challenge Response Q.931 Cause Code Assigned Session ID Call Serial Number Min and Max BPS Framing Type Caller Number Calling Number VPN Intro + VPDN, v4.3 101 L2TP Operation PSTN or ISDN ISP User LAC LNS Home LAN L2TP Tunnel Control Connection PPP PPP PPP L2TP Session Call IP VPN Intro + VPDN, v4.3 102 Page 84-51

Control Connection Setup User PSTN or ISDN LAC or LNS ISP LNS or LAC Home LAN SCCRQ SCCRP SCCN ZLB ACK VPN Intro + VPDN, v4.3 103 L2TP Tunnel Authentication Similar to CHAP Optional Using a Challenge AVP Included in SCCRQ or SCCRP Messages A Single Shared Password VPN Intro + VPDN, v4.3 104 Page 84-52

L2TP Incoming Call PSTN or ISDN ISP User LAC LNS Home LAN User Calls in ICRQ ICRP ICCN ZLB ACK VPN Intro + VPDN, v4.3 105 Forwarding of PPP Frames ppp PSTN or ISDN ISP User LAC LNS Home LAN L2TP Tunnel Control Connection Virtual interface IP PPP Call PPP L2TP Session PPP VPN Intro + VPDN, v4.3 106 Page 84-53

Disconnecting a Session User PSTN or ISDN LAC or LNS ISP LNS or LAC Home LAN CDN (Clean up) ZLB ACK (Clean up) VPN Intro + VPDN, v4.3 107 L2TP over UDP/IP Using UDP Port 1701 Might be Changed by LAC or LNS, Could Cause a Problem for NAT IP Fragmentation May be Involved LCP Could negotiate MRU Recommended to Use UDP Checksum VPN Intro + VPDN, v4.3 108 Page 84-54

L2TP Security Tunnel Endpoint Security Optional, Performed by LAC and LNS Packet Level Security the lower layer uses encryption End to End Security Using a Secure Transport L2TP and IPsec IPsec is in charge of packet level security (RFC 3193) VPN Intro + VPDN, v4.3 109 Page 84-55