Intranet: What Exactly Is A VPN?
Intranet: What Exactly Is A VPN?
Intranet: What Exactly Is A VPN?
The Virtual Private Network - VPN - has attracted the attention of many organizations
looking to both expand their networking capabilities and reduce their costs.
The VPN can be found in workplaces and homes, where they allow employees to safely
log into company networks. Telecommuters and those who travel often find a VPN a
more convenient way to stay connected to the corporate intranet. No matter your
current involvement with VPNs, this is a good technology to know something about.
This VPN tutorial involves many interesting aspects of network protocol design, Internet
security, network service outsourcing, and technology standards.
A VPN supplies network connectivity over a possibly long physical distance. In this
respect, a VPN is a form of Wide Area Network (WAN).
The key feature of a VPN, however, is its ability to use public networks like the Internet
rather than rely on private leased lines. VPN technologies implement restricted-access
networks that utilize the same cabling and routers as a public network, and they do so
without sacrificing features or basic security.
The potential problems with the VPN outnumber the advantages and are generally more
difficult to understand. The disadvantages do not necessarily outweigh the advantages,
however. From security and performance concerns, to coping with a wide range of
sometimes incompatible vendor products, the decision of whether or not to use a VPN
cannot be made without significant planning and preparation.
A VPN supplies network connectivity over a possibly long physical distance. In this
respect, a VPN is a form of Wide Area Network (WAN). VPNs enable file sharing, video
conferencing and similar network services. Virtual private networks generally don't
provide any new functionality that isn't already offered through alternative mechanisms,
but a VPN implements those services more efficiently / cheaply in most cases.
A key feature of a VPN is its ability to work over both private networks as well as public
networks like the Internet. Using a method called tunneling, a VPN use the same
hardware infrastructure as existing Internet or intranet links. VPN technologies includes
various security mechanisms to protect the virtual, private connections.
In recent years, many organizations have increased the mobility of their workers by
allowing more employees to telecommute. Employees also continue to travel and face a
growing need to stay connected to their company networks.
A VPN can be set up to support remote, protected access to the corporate home offices
over the Internet. An Internet VPN solution uses aclient/server design works as follows:
1. A remote host (client) wanting to log into the company network first connects to any
public Internet Service Provider (ISP).
2. Next, the host initiates a VPN connection to the company VPN server. This
connection is made via a VPN client installed on the remote host.
3. Once the connection has been established, the remote client can communicate with
the internal company systems over the Internet just as if it were a local host.
Before VPNs, remote workers accessed company networks over private leased lines or
through dialup remote access servers. While VPN clients and servers careful require
installation of hardware and software, an Internet VPN is a superior solution in many
situations.
Besides using virtual private networks for remote access, a VPN can also bridge two
networks together. In this mode of operation, an entire remote network (rather than just
a single remote client) can join to a different company network to form an extended
intranet. This solution uses a VPN server to VPN server connection.
Intranet / Local Network VPNs
Internal networks may also utilize VPN technology to implement controlled access to
individual subnets within a private network. In this mode of operation, VPN clients
connect to a VPN server that acts as the network gateway.
This type of VPN use does not involve an Internet Service Provider (ISP) or public
network cabling. However, it allows the security benefits of VPN to be deployed inside
an organization. This approach has become especially popular as a way for businesses
to protect their WiFi local networks.
A VPN - Virtual Private Network - is one solution to establishing long-distance and/or
secured network connections. VPNs are normally implemented (deployed) by
businesses or organizations rather than by individuals, but virtual networks can be
reached from inside a home network. Compared to other technologies, VPNs offers
several advantages, particularly benefits for wireless local area networking.
Answer: For an organization looking to provide a secured network infrastructure for its
client base, a VPN offers two main advantages over alternative technologies: cost
savings, and network scalability. To the clients accessing these networks, VPNs also
bring some benefits of ease of use.
Support costs - With VPNs, the cost of maintaining servers tends to be less than other
approaches because organizations can outsource the needed support from professional
third-party service providers. These provides enjoy a much lower cost structure through
economy of scale by servicing many business clients.
Internet based VPNs avoid this scalability problem by simply tapping into the the public
lines and network capability readily available. Particularly for remote and international
locations, an Internet VPN offers superior reach and quality of service.
Using a VPN
To use a VPN, each client must possess the appropriate networking software or
hardware support on their local network and computers. When set up properly, VPN
solutions are easy to use and sometimes can be made to work automatically as part of
network sign on.
VPN technology also works well with WiFi local area networking. Some organizations
use VPNs to secure wireless connections to their local access points when working
inside the office. These solutions provide strong protection without affecting
performance excessively.
Limitations of a VPN
Despite their popularity, VPNs are not perfect and limitations exist as is true for any
technology. Organizations should consider issues like the below when deploying and
using virtual private networks in their operations:
3. Historically, VPN products and solutions from different vendors have not always been
compatible due to issues with VPN technology standards. Attempting to mix and match
equipment may cause technical problems, and using equipment from one provider may
not give as great a cost savings.
VPN supports two types of tunneling - voluntary and compulsory. Both types of
tunneling are commonly used.
In voluntary tunneling, the VPN client manages connection setup. The client first makes
a connection to the carrier network provider (an ISP in the case of Internet VPNs).
Then, the VPN client application creates the tunnel to a VPN server over this live
connection.
In compulsory tunneling, the carrier network provider manages VPN connection setup.
When the client first makes an ordinary connection to the carrier, the carrier in turn
immediately brokers a VPN connection between that client and a VPN server. From the
client point of view, VPN connections are set up in just one step compared to the two-
step procedure required for voluntary tunnels.
Compulsory VPN tunneling authenticates clients and associates them with specific VPN
servers using logic built into the broker device. This network device is sometimes called
the VPN Front End Processor (FEP), Network Access Server (NAS) or Point of
Presence Server (POS). Compulsory tunneling hides the details of VPN server
connectivity from the VPN clients and effectively transfers management control over the
tunnels from clients to the ISP. In return, service providers must take on the additional
burden of installing and maintaining FEP devices.
Several computer network protocols have been implemented specifically for use with
VPN tunnels. The three most popular VPN tunneling protocols listed below continue to
compete with each other for acceptance in the industry. These protocols are generally
incompatible with each other.
The original competitor to PPTP for VPN tunneling was L2F, a protocol implemented
primarily in Cisco products. In an attempt to improve on L2F, the best features of it and
PPTP were combined to create a new standard called L2TP. Like PPTP, L2TP exists at
the data link layer (Layer Two) in the OSI model -- thus the origin of its name.
PPTP - Point-to-Point Tunneling Protocol - extends the Point to Point Protocol (PPP)
standard for traditional dial-up networking. PPTP is best suited for the remote access
applications of VPNs, but it also supports LAN internetworking. PPTP operates at Layer
2 of the OSI model. (See below)
Sponsored Links
Network: Router Ssl VpnClientless Remote Network Access for Enterprises; View
Free Demo!Juniper.net/Router+Ssl+Vpn
Watch US TV AnywhereGet Hulu and other great US TV sites anywhere in the
worldmy-private-network.co.uk
AutoDoc for WatchGuardCreate your WatchGuard config documentation
automatically.www.autodoc.com
Using PPTP
PPTP packages data within PPP packets, then encapsulates the PPP packets within IP
packets (datagrams) for transmission through an Internet-based VPN tunnel. PPTP
supports data encryption and compression of these packets. PPTP also uses a form
of General Routing Encapsulation (GRE) to get data to and from its final destination.
PPTP-based Internet remote access VPNs are by far the most common form of PPTP
VPN. In this environment, VPN tunnels are created via the following two-step process:
1. The PPTP client connects to their ISP using PPP dial-up networking (traditional
modem or ISDN).
2. Via the broker device (described earlier), PPTP creates a TCP control
connectionbetween the VPN client and VPN server to establish a tunnel. PPTP uses
TCP port 1723 for these connections.
PPTP also supports VPN connectivity via a LAN. ISP connections are not required in
this case, so tunnels can be created directly as in Step 2 above.
Once the VPN tunnel is established, PPTP supports two types of information flow:
With control messages, PPTP utlizes a so-called magic cookie. The PPTP magic
cookie is hardwired to the hexadecimal number 0x1A2B3C4D. The purpose of this
cookie is to ensure the receiver interprets the incoming data on the correct byte
boundaries.
PPTP Security
PPTP supports authentication, encryption, and packet filtering. PPTP authentication
uses PPP-based protocols like EAP, CHAP, and PAP. PPTP supports packet filtering
on VPN servers. Intermediate routers and other firewalls can also be configured to
selectively filter PPTP traffic.
In general, PPTP relies on the functionality of PPP for these aspects of virtual private
networking.
authenticating users and maintaining the remote dial-up connection
encapsulating and encrypting IP, IPX, or NetBEUI packets
PPTP directly handles maintaining the VPN tunnel and transmitting data through the
tunnel. PPTP also supports some additional security features for VPN data beyond what
PPP provides.
PPTP remains a popular choice for VPNs thanks to Microsoft. PPTP clients are freely
available in all popular versions of Microsoft Windows. Windows servers also can
function as PPTP-based VPN servers.
One drawback of PPTP is its failure to choose a single standard for authentication and
encryption. Two products that both fully comply with the PPTP specification may be
totally incompatible with each other if they encrypt data differently, for example.
Concerns also persist over the questionable level of security PPTP provides compared
to alternatives.
VPN Tunneling is a network technology that encapsulates packets at the same level or
below. One type of packet is encapsulated within the datagram (packet in TCP/IP or
UDP containing source and destination address) of a different protocol. Since multiple
protocols are pushed through a given network it is said to tunnel. Multiple Protocols that
support encryption and authentication make up a Virtual Private Network. Tunneling is
used to transport a network protocol through a network; which it normally does not
support.
A VPN tunnel software has a management protocol that creates, maintains and
terminates a tunnel. After the VPN tunnel is established data can be sent. How does
tunneling work? A client or server uses the data transfer protocol to prepare the data
transfer. Data is transferred through the VPN tunnel using a datagram based protocol.
When a tunnel session is created both end points must agree to various parameters
such as address assignment, encryption or compression parameters. PPTP-Point to
point tunneling protocol/L2TP-Layer 2 Tunneling protocol encapsulates private network
traffic in packets to be transmitted over public networks (TCP/IP). The tunnel thus does
three things
Types of Tunnels
Tunnels are basically of two types; Voluntary tunnels and Compulsory tunnels.
Voluntary Tunnel
Voluntary tunnels where a client or user issues the VPN request to configure and create
a voluntary tunnel. In this case the user's computer is the end point and acts as a VPN
client. Voluntary tunnels require an IP connection either a LAN or a dial up connection.
In a LAN case there is already a network that routes the encapsulated payloads to the
tunnel server. For a dial up connection the computer must be connected to the internet
to establish a voluntary tunnel. The initial establishing of IP connectivity is not a part of
VPN and the client needs VPN tunnel client software to create a voluntary tunnel.
Compulsory tunnel
A VPN remote access server configures and creates a tunnel where the user computer
is not the end point. The end points are therefore the VPN remote access server and
the VPN tunneling (LAN) server. A number of ISP vendors that have dialup servers are
now offering VPN services. The server (NAS-Network Access Server) creating and
providing the tunnel for the client is known as the FEP-Front End Processor for PPTP
and LAC-L2TP Access Concentrator for L2TP. The FEP must have the appropriate
VPN tunneling software protocol and should be capable of establishing the tunnel when
the client requires. The client is compulsorily availing the service of the FEP hence the
terminology compulsory tunneling. Separate tunnels are created for Multiple voluntary
Dial up clients where as a single compulsory tunnel can be used to multiple clients. The
tunnel is existent as long as there is some client using the tunnel.
PPTP control connection creates, maintains and terminates the tunnel. This is
done using various management messages. PPTP Echo-Request and PPTP
Echo- Reply-detect, connectivity failure between serve and client. PPTP control
packet consists of IP header, TCP header, PPTP control message and a data
link trailer. For more information about the exact structure of PPTP control
messages search for RFC 2637 in the RFC database.
GRE-Generic Routing Encapsulation is used to encapsulate PPP frames as
tunneled data. The initial PPP payload is encrypted and encapsulated with PPP.
This PPP frame is then encapsulated with a modified GRE header. GRE is
described by RFC 1701 and RFC 1702. The Packet now has a Data link header,
IP header, GRE Header, PPP Header, Encrypted PPP payload and Data link
trailer.
PPTP payloads that have been encapsulated can be either encrypted or
compressed. Sometimes both encryption and compression are done.
Authentication mechanisms in PPP connections are used by PPTP. EAP-
Extensible Authentication protocol, MS-CHAP- Microsoft Challenge Handshake
Authentication Protocol, SPAP-Shiva Password Authentication protocol and
PAP- Password Authentication Protocol are the other authentication protocols
that can be used.
For encryption that uses MPPE-Microsoft Point to Point Encryption of PPP, EAP-
TLS, MS-CHAP or MS-CHAPv2 authentication must be used. PPTP inherits
encryption as well as compression from PPP. These can be implemented
independently or both together. This only is a link and end-to-end encryption is
not provided by PPTP.
L2TP control messages are sent over the IP network between an L2TP client and
L2TP server as UDP messages. Even data uses UDP messages. For Windows
UDP port 1701 is used. For Windows server 2003 UDP datagrams are sent as
an encrypted payload of IPSec. The packet consists of data link header, IP
Header, IPSec ESP Header, UDP header, L2TP message, IPSec ESDP trailer,
IPsec ESP Auth trailer and Data Link trailer.
Payloads of PPP can either be encrypted or compressed. Both Encryption and
compression can be done.
ESP- Encapsulating Security Payload of IPSec provides the encryption for L2TP
in Transport mode. IPSec is used for both authentication and encryption. Non-
encrypted L2TP connections can be established by windows based software.
Authentication here involves PPP authentication mechanisms.
An Internet-based L2TP server is an L2TP-enabled remote access server with
one interface on the Internet and a second interface on a private intranet.
L2TP tunnel maintenance and tunneled data have the same packet structure and
it supports multiple calls for each tunnel. L2TP control message and header for
data is the tunnel ID that identifies the tunnel.
L2TP encapsulation involves the encapsulation of a PPP payload with a PPP
header and a L2TP header. UDP encapsulation is done on the L2TP packet
which provides a UDP header and source and destination ports are set to 1701.
The UDP message is encrypted and encapsulated with an IPSec 'ESP header
and trailer' and ESP authentication trailer.
IPSec provides two protocols Authentication Header AH and ESP.
IPSec creates and maintains its own tunnel in tunnel mode where portal to portal
communications security is provided.
IPSec's transport mode only provides authentication and encryption for end to
end communications.
VPN's can be created in either mode. Implementations in either mode have different
security implications. IPSec protocols are to secure packet flows and key exchange
(IKE).
PPTP
PPTP is the most widely supported VPN method among Windows clients.
It is link layer protocol which has a low overhead making it faster than other VPN
methods.
EAP authentication uses digital certificates for mutual authentication and
eliminates the earlier security flaws of PPTP.
Public Key Infrastructure is not required
Many firewall based enterprise level software support PPTP. (ISA server, CISCO PIX,
SonicWALL). The other operating systems that incorporate them or can incorporate
them are
L2TP uses digital certificates and also provides computer authentication. This
adds an extra level of security. User authentication can be performed via the
same PPP authentication mechanisms as PPTP.
L2TP gives you data confidentiality which is not present in PPTP. Data integrity,
'authentication of origin' and replay protection are added advantages.
Extra Security measures slightly slow the performance when compared to PPTP.
IPSec's Encapsulating Security Payload protocol, provides the encryption for
L2TP tunnels.
Many Firewall products support L2TP VPNs. (including ISA Server, CheckPoint, Cisco
PIX, and WatchGuard)
IPSec
IPsec is known for its use with L2TP for encryption. It can be considered as a VPN
solution for a VPN gateway-to-gateway. IPSec operates at the network layer.
Clients do not have access to the whole network or subnet as with other
protocols.
Custom programming is necessary in Java or Active-X to enable other
applications to access VPN through the Web Browser.
The disadvantage is client browser settings need to be opened up to active
content which exposes the browser to malicious content. Unsigned active content
can be blocked and plug-ins is digitally signed.
Virtual private networking is a cost effective way to provide remote access to your
company network. Selection of the proper tunneling method decides your level of
security.
Remote users have been able to connect servers using a variety of applications like
outlook web access connection through the Exchange server. Wireless users
connecting over the internet are more susceptible to security problems. VPN in a
wireless environment provides the necessary security for wireless data transfer as the
information sent is encrypted. VPN technologies have brought about a secure logical
connection between two end points in a network. Setup for VPN may not require you to
buy any extra hardware device or software. You may already have the technology that
makes it possible to setup a VPN service. Sometimes you may just have to purchase a
few accessories like VPN routers.
Hardware VPN vendors vouch that their products are safer and the software VPN
vendors are not far behind. Whatever are the claims VPN is growing steadily and many
attempts at increasing it security and performance is making it a lucrative solution to
adapt. VPN solutions can either be hardware oriented or software oriented. The
difference is very basic. It depends upon where the protocols are executed in the
hardware device or on the computer system (where the operating system software of
VPN client-server software is used). SSL VPN is a relative new clientless VPN
technology that is come up as a challenge to IPSec VPN technology.
The thought behind VPN technology is very similar to QR codes. The goal of both
services is to pass on a message which needs to be deciphered before returning the
final information to the user. The process is different for the VPN and the QR code but
the end result is the same.
If your network already has domain controller and DNS servers then you can configure
the domain for DHCP services. This is achieved from the control panel. Choose 'add
Windows components'.
Go to the certificate services of the windows component from the control panel
A warning message telling you that you will not be able to rename the machine or
change its group membership after the certificates are installed will appear
Click yes in the next window
Choose 'Enterprise Root CA' as the certificate authority you want to install
While entering the common name for certificate authority you must select a
validity period (1 or 2 years depending on your corporate security policy)
The default period for a certificate to be valid is 5years
Windows will generate the cryptographic keys and will ask you to give a location
for the certificate database
Dependent on the performance and fault tolerance you can choose a different
location or just go ahead with the default location
'Restart the IIS services' to install the necessary components.
The remote access policies container is to be right clicked to get the new remote
access policy option
Select 'Typical policy for a common scenario' option
Enter 'VPN access' as the policy name and continue
Select the VPN option and continue to apply policy to users or groups
The next option will be the Authentication Methods screen on which select MS
CHAPV2
The next screen will give you options of encryption, confirm the strongest
encryption option and finish configuring the remote access policy.
Select create a connection to the Network at your work place' and next select the
VPN connection option.
Give the name of company of any name to describe your connection.
Next you will be asked for an external IP address. This IP address is the address
of the connection that is connected to the VPN server.
Enter this and your VPN connection is ready.
Test the connection once it is ready by connecting to the server.
When you dial-up set the type of VPN to PPTP VPN.
There are variations in the VPN client connection due to various encryption and
authentication technique. Only some have been outlined above.
VPN routers are sold by many companies. Their set up is dependent on the product of
the respective company. In any case the required software and instructions of the setup
are provided along with the purchase. Many of these companies also offer service to
setup and configure your VPN connection.
VPN setup is a process that needs to be discussed with the Network administrator.
Many a time you are guided by the network administrator in the setup at your remote
access client network. VPN may be setup but always be on the safe side. Get a good
antivirus and install a good firewall to protect your computer from unwanted attacks.
VPN solutions: Technology protecting your Privacy
An authenticated and encrypted data transmission between two systems is what a VPN
is all about. User's privacy, Data Integrity and data authenticity is achieved through the
various protocols adopted by VPN. Combining advances in tunneling, encryption and
firewall technologies with good authentication mechanism we have an optimum solution
in VPN. Tools of transparent setup and management along with flexibility and scalability
have emphasized VPN's gradual acceptance by business and enterprises. Intranets,
Extranets or private networks VPN technology could be integrated seamlessly into the
network. Secure access should be provided for connections like