SlideShare a Scribd company logo
1 of 6
Site to Site IPSEC VPN
What is VPN?
A VPN is a mean to securely and privately transmit data over an unsecured and shared network infrastructure. VPN’s secure the data tha is
transmitted across common infrastructure such as internet by the following:
• Encapsulate the data,
• Encrypt the data,
• Or by both.
VPN solutions can be implemented along L2, L3 or L4 layers of TCP/IP model,
• Layer 2 VPN technologies – L2TP, PPTP
• Layer 3 VPN technologies – MPLS, IPSEC, GRE
• Layer 4 VPN technologies – SSL VPN
Among the above mentioned VPN technologies, we concentrate on IPSEC VPN solutions as it offers cost effective site to site connectivity over
shared infra – internet and standout from MPLS and GRE by encrypting data (transport mode) or encapsulate & encrypt data (tunnel mode).
Characteristics of effective VPN’s
Confidential VPN implementation must meet:
• Data Confidentiality
• Protect the message contents from being interpreted by unauthenticated or unauthorized sources.
• Data integrity
• Guarantees that the message contents have not been tampered with or altered in transit from source to destination.
• Sender non-reputation
• A means to prevent a sender from falsely denying that they had sent a message to the receiver.
• Message Authentication
• Ensures that a message was sent from an authentic source and that messages are being sent to authentic destinations.
What is an IPSEC VPN?
Internet Protocol Security (IPsec) is a network protocol suite that authenticates and encrypts the packets of data sent over a
network. IPsec includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of
cryptographic keys to use during the session. An IPSEC VPNs encrypt data at the Layer 3 IP packet layer offering a comprehensively secure VPN
solution through providing data authentication, anti-replay protection, data confidentiality and data integrity protection.
IPSec handles encryption right at the IP datagram level using a new protocol, the Encapsulating Security Protocol (ESP). Generally,
ESP can be used inside another IP packet, so that ESP can be transported across regular IP communications channels. Instead of the normal TCP
or UDP packet designation, the header information would declare the packet's payload to be ESP instead. Where ESP secures the data by
encryption, the Authentication Header (AH) protocol of IPSec handles only the authentication, without confidentiality.
Operating modes of IPSEC VPN
IPSec can be configured to operate in two different modes, Tunnel and Transport mode. Use of each mode depends on the
requirements and implementation of IPSec.
Tunel Mode IPSEC VPN
IPSec tunnel mode is the default mode. With tunnel mode, the entire original IP packet is protected by IPSec. This means IPSec
wraps the original packet, encrypts it, adds a new IP header and sends it to the other side of the VPN tunnel (IPSec peer).
Transport Mode IPSEC VPN
Transport mode provides the protection of data, also known as IP Payload, and consists of TCP/UDP header + Data, through an AH
or ESP header. The payload is encapsulated by the IPSec headers and trailers. The original IP headers remain intact, except that the IP protocol
field is changed to ESP (50) or AH (51), and the original protocol value is saved in the IPsec trailer to be restored when the packet is decrypted.
Site to Site IPSEC VPNGenerally, site to site VPN established between gateway to gateway in tunnel mode, the gateway acting as a proxy for the hosts
behind it. In tunnel mode, an IPSec header (AH or ESP header) is inserted between the IP header and the upper layer protocol. Between AH and
ESP, ESP is most commonly used in IPSec VPN Tunnel configuration.
IP Header ESP Auth TrailerTCP/UDP DATA ESP TrailerNew IP Header ESP Headers
IP Header TCP/UDP DATANew IP Header Authentication Headers
IPSec Tunnel mode with ESP header
IPSec Tunnel mode with AH header
Site to site IPSEC VPN can be deployed as follows:
1. Policy based IPSec VPN (traditional)
2. Route based IPSec VPN
Policy-based VPN’s encrypt and encapsulate a subset of traffic flowing through an interface according to a defined security policies.
The policy may dictate that only some or all of the traffic being evaluated is placed into the VPN. This type of VPN is often referred to as LAN-to-
LAN.
A route-based VPN employs routed tunnel interfaces as the endpoints of the virtual network. All traffic passing through a tunnel
interface is placed into the VPN. Rather than relying on an explicit policy to dictate which traffic enters the VPN, static and/or dynamic IP routes
are formed to direct the desired traffic through the VPN tunnel interface.
Policy based IPSec VPN
Route based IPSec VPN
Policy based vs Route based IPSec VPN
Policy-Based IPSec VPN Route-Based IPSec VPN
Support IP unicast traffic, does not support IP multicast or non-ip
protocols
Supports IP unicast, Multicast and non-ip protocols
No support for dynamic routing protocols Supports dynamic routing protocols such as OSPF, EIGRP & BGP
Traffic will be encrypted and placed in tunnel based on security
policies or ACL
Traffic that are routed via tunnel interface will be encrypted
Complex configuration and maintenance overhead Simple configuration
Limited QoS QoS is fully supported
THANK YOU

More Related Content

What's hot

IPSec VPN & IPSec Protocols
IPSec VPN & IPSec ProtocolsIPSec VPN & IPSec Protocols
IPSec VPN & IPSec Protocols NetProtocol Xpert
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefitsqaisar17
 
IPSec Overview
IPSec OverviewIPSec Overview
IPSec Overviewdavisli
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentationstolentears
 
VLAN Trunking Protocol
VLAN Trunking ProtocolVLAN Trunking Protocol
VLAN Trunking ProtocolNetwax Lab
 
IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1Shobhit Sharma
 
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLANIndonesia Network Operators Group
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPTAIRTEL
 
Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD) Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD) KHNOG
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)Avinash Nath
 
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERSSITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS NetProtocol Xpert
 
MikroTik & RouterOS
MikroTik & RouterOSMikroTik & RouterOS
MikroTik & RouterOSFaelix Ltd
 

What's hot (20)

Ipsec
IpsecIpsec
Ipsec
 
IPSec VPN & IPSec Protocols
IPSec VPN & IPSec ProtocolsIPSec VPN & IPSec Protocols
IPSec VPN & IPSec Protocols
 
Overlay networks
Overlay networksOverlay networks
Overlay networks
 
VPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and BenefitsVPN, Its Types,VPN Protocols,Configuration and Benefits
VPN, Its Types,VPN Protocols,Configuration and Benefits
 
IPSec Overview
IPSec OverviewIPSec Overview
IPSec Overview
 
Ip security
Ip security Ip security
Ip security
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
VLAN Trunking Protocol
VLAN Trunking ProtocolVLAN Trunking Protocol
VLAN Trunking Protocol
 
IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1IPSec (Internet Protocol Security) - PART 1
IPSec (Internet Protocol Security) - PART 1
 
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
20 - IDNOG03 - Franki Lim (ARISTA) - Overlay Networking with VXLAN
 
Https
HttpsHttps
Https
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Bgp
BgpBgp
Bgp
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD) Bidirectional Forwarding Detection (BFD)
Bidirectional Forwarding Detection (BFD)
 
OSPF Fundamental
OSPF FundamentalOSPF Fundamental
OSPF Fundamental
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERSSITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
SITE TO SITE IPSEC VPN TUNNEL B/W CISCO ROUTERS
 
Virtual Private Network VPN
Virtual Private Network VPNVirtual Private Network VPN
Virtual Private Network VPN
 
MikroTik & RouterOS
MikroTik & RouterOSMikroTik & RouterOS
MikroTik & RouterOS
 

Similar to Secure Your Network with an IPSEC VPN

IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfsolimankellymattwe60
 
The Security layer
The Security layerThe Security layer
The Security layerSwetha S
 
Define tunneling in the VPN environment and explain the difference bet.docx
Define tunneling in the VPN environment and explain the difference bet.docxDefine tunneling in the VPN environment and explain the difference bet.docx
Define tunneling in the VPN environment and explain the difference bet.docxearleanp
 
I psec cisco
I psec ciscoI psec cisco
I psec ciscoDeepak296
 
IP security and VPN presentation
IP security and VPN presentation IP security and VPN presentation
IP security and VPN presentation KishoreTs3
 
BAIT1103 Chapter 6
BAIT1103 Chapter 6BAIT1103 Chapter 6
BAIT1103 Chapter 6limsh
 
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)n|u - The Open Security Community
 
How does IPsec provide security in IPv6- What is the relationship of I.docx
How does IPsec provide security in IPv6- What is the relationship of I.docxHow does IPsec provide security in IPv6- What is the relationship of I.docx
How does IPsec provide security in IPv6- What is the relationship of I.docxcliftonl1
 
IP Security in Network Security NS6
IP Security in Network Security NS6IP Security in Network Security NS6
IP Security in Network Security NS6koolkampus
 

Similar to Secure Your Network with an IPSEC VPN (20)

Ipsecurity
IpsecurityIpsecurity
Ipsecurity
 
IP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdfIP Security One problem with Internet protocol (IP) is that it has.pdf
IP Security One problem with Internet protocol (IP) is that it has.pdf
 
Lec 9.pptx
Lec 9.pptxLec 9.pptx
Lec 9.pptx
 
Ip sec
Ip secIp sec
Ip sec
 
The Security layer
The Security layerThe Security layer
The Security layer
 
Lecture14..pdf
Lecture14..pdfLecture14..pdf
Lecture14..pdf
 
Define tunneling in the VPN environment and explain the difference bet.docx
Define tunneling in the VPN environment and explain the difference bet.docxDefine tunneling in the VPN environment and explain the difference bet.docx
Define tunneling in the VPN environment and explain the difference bet.docx
 
IP Security
IP SecurityIP Security
IP Security
 
I psec cisco
I psec ciscoI psec cisco
I psec cisco
 
Unit 6
Unit 6Unit 6
Unit 6
 
IP security and VPN presentation
IP security and VPN presentation IP security and VPN presentation
IP security and VPN presentation
 
Ip Security.pptx
Ip Security.pptxIp Security.pptx
Ip Security.pptx
 
BAIT1103 Chapter 6
BAIT1103 Chapter 6BAIT1103 Chapter 6
BAIT1103 Chapter 6
 
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
Converting your linux Box in security Gateway Part – 2 (Looking inside VPN)
 
IP SEC.ptx
IP SEC.ptxIP SEC.ptx
IP SEC.ptx
 
IP Security
IP SecurityIP Security
IP Security
 
Network IP Security.pdf
Network IP Security.pdfNetwork IP Security.pdf
Network IP Security.pdf
 
How does IPsec provide security in IPv6- What is the relationship of I.docx
How does IPsec provide security in IPv6- What is the relationship of I.docxHow does IPsec provide security in IPv6- What is the relationship of I.docx
How does IPsec provide security in IPv6- What is the relationship of I.docx
 
IP Security
IP SecurityIP Security
IP Security
 
IP Security in Network Security NS6
IP Security in Network Security NS6IP Security in Network Security NS6
IP Security in Network Security NS6
 

Recently uploaded

Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 

Recently uploaded (20)

Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 

Secure Your Network with an IPSEC VPN

  • 1. Site to Site IPSEC VPN
  • 2. What is VPN? A VPN is a mean to securely and privately transmit data over an unsecured and shared network infrastructure. VPN’s secure the data tha is transmitted across common infrastructure such as internet by the following: • Encapsulate the data, • Encrypt the data, • Or by both. VPN solutions can be implemented along L2, L3 or L4 layers of TCP/IP model, • Layer 2 VPN technologies – L2TP, PPTP • Layer 3 VPN technologies – MPLS, IPSEC, GRE • Layer 4 VPN technologies – SSL VPN Among the above mentioned VPN technologies, we concentrate on IPSEC VPN solutions as it offers cost effective site to site connectivity over shared infra – internet and standout from MPLS and GRE by encrypting data (transport mode) or encapsulate & encrypt data (tunnel mode). Characteristics of effective VPN’s Confidential VPN implementation must meet: • Data Confidentiality • Protect the message contents from being interpreted by unauthenticated or unauthorized sources. • Data integrity • Guarantees that the message contents have not been tampered with or altered in transit from source to destination. • Sender non-reputation • A means to prevent a sender from falsely denying that they had sent a message to the receiver. • Message Authentication • Ensures that a message was sent from an authentic source and that messages are being sent to authentic destinations.
  • 3. What is an IPSEC VPN? Internet Protocol Security (IPsec) is a network protocol suite that authenticates and encrypts the packets of data sent over a network. IPsec includes protocols for establishing mutual authentication between agents at the beginning of the session and negotiation of cryptographic keys to use during the session. An IPSEC VPNs encrypt data at the Layer 3 IP packet layer offering a comprehensively secure VPN solution through providing data authentication, anti-replay protection, data confidentiality and data integrity protection. IPSec handles encryption right at the IP datagram level using a new protocol, the Encapsulating Security Protocol (ESP). Generally, ESP can be used inside another IP packet, so that ESP can be transported across regular IP communications channels. Instead of the normal TCP or UDP packet designation, the header information would declare the packet's payload to be ESP instead. Where ESP secures the data by encryption, the Authentication Header (AH) protocol of IPSec handles only the authentication, without confidentiality. Operating modes of IPSEC VPN IPSec can be configured to operate in two different modes, Tunnel and Transport mode. Use of each mode depends on the requirements and implementation of IPSec. Tunel Mode IPSEC VPN IPSec tunnel mode is the default mode. With tunnel mode, the entire original IP packet is protected by IPSec. This means IPSec wraps the original packet, encrypts it, adds a new IP header and sends it to the other side of the VPN tunnel (IPSec peer). Transport Mode IPSEC VPN Transport mode provides the protection of data, also known as IP Payload, and consists of TCP/UDP header + Data, through an AH or ESP header. The payload is encapsulated by the IPSec headers and trailers. The original IP headers remain intact, except that the IP protocol field is changed to ESP (50) or AH (51), and the original protocol value is saved in the IPsec trailer to be restored when the packet is decrypted.
  • 4. Site to Site IPSEC VPNGenerally, site to site VPN established between gateway to gateway in tunnel mode, the gateway acting as a proxy for the hosts behind it. In tunnel mode, an IPSec header (AH or ESP header) is inserted between the IP header and the upper layer protocol. Between AH and ESP, ESP is most commonly used in IPSec VPN Tunnel configuration. IP Header ESP Auth TrailerTCP/UDP DATA ESP TrailerNew IP Header ESP Headers IP Header TCP/UDP DATANew IP Header Authentication Headers IPSec Tunnel mode with ESP header IPSec Tunnel mode with AH header Site to site IPSEC VPN can be deployed as follows: 1. Policy based IPSec VPN (traditional) 2. Route based IPSec VPN Policy-based VPN’s encrypt and encapsulate a subset of traffic flowing through an interface according to a defined security policies. The policy may dictate that only some or all of the traffic being evaluated is placed into the VPN. This type of VPN is often referred to as LAN-to- LAN. A route-based VPN employs routed tunnel interfaces as the endpoints of the virtual network. All traffic passing through a tunnel interface is placed into the VPN. Rather than relying on an explicit policy to dictate which traffic enters the VPN, static and/or dynamic IP routes are formed to direct the desired traffic through the VPN tunnel interface. Policy based IPSec VPN Route based IPSec VPN
  • 5. Policy based vs Route based IPSec VPN Policy-Based IPSec VPN Route-Based IPSec VPN Support IP unicast traffic, does not support IP multicast or non-ip protocols Supports IP unicast, Multicast and non-ip protocols No support for dynamic routing protocols Supports dynamic routing protocols such as OSPF, EIGRP & BGP Traffic will be encrypted and placed in tunnel based on security policies or ACL Traffic that are routed via tunnel interface will be encrypted Complex configuration and maintenance overhead Simple configuration Limited QoS QoS is fully supported