A 309
A 309
A 309
1. Introduction
In the past, organizations or enterprises would physically install lines over large distances to ensure secure data transfer. However, this system is impractical for every enterprise and everyday users due to the cost, space, and time required for such installations. In recent years, with the exponential growth of the Internet, the landscape of telecommunications has changed radically and the Internet has become part of almost every aspect of the developed world including education, banking, business, and politics. Over the past two decades the public Internet has been found to be vulnerable to attackers seeking sensitive information. The most recent solution to this problem has been IP-based Virtual Private Network (IPVPN). A Virtual Private Network (VPN) can be defined as a way to provide secure communication between members of a group through use of the public telecommunication infrastructure, maintaining privacy through the use of a tunneling protocol and security procedures. VPN systems provide users with the illusion of a completely private network. An IP Virtual Private Network (IPVPN) can be defined as a VPN implementation that uses public or shared IP network resources to emulate the characteristics of an IP-based private network. The main purpose of a VPN is to give enterprises the same capabilities, or even better, as in private networks, but
3. Vpn Classification
There are wide variety types of possible VPNs. In this section, we give a brief description for some of the VPNs
309
appeared in the literature. Please note that it is difficult to precisely divide them into different categories. There are potential overlaps between some of the VPNs. The technologies can be classified in several ways. Some of these ways are described in this paper as shown in table (1) Table(1) Classification of VPN technologies VPN solutions In-house CE-based Secure Client-based PPTP L2TP IPSec Web-based SSL Out-source PE-based Trusted MPLS
cost associated with purchasing, installing, and maintaining the client software. Web-based VPNs typically support a limited set of Web applications. Client-based VPNs are based on PPTP, L2TP, IPSec and SSL. Client-based VPNs require a client software to be installed on each host that is remotely connecting to the enterprise network. Client based VPNs allow remote access users to get the seamless access to the enterprise network from their PCs. Client-based VPN solution requires purchasing, installing, and maintaining the client software.
310
MPLS network to each remote access user. Even if cost would not be an issue, remote access with trusted VPN solution which is based on MPLS VPN could only be supported to fixed locations and mobility would thus not be supported at all. 4.1.1 Access requirements Web-based VPN solution which is based on SSL VPN is well suited for remote access connections with low access requirements in which remote access users need access to the Web-based applications such as online catalogues, price lists, order entry, customer contact reporting, or similar applications. Client-based VPN solution which is based on PPTP, L2TP, IPSec, or SSL VPNs is a good choice for remote access connections with high access requirements in which remote access users need access to the entire or large portions of the enterprise network. In this situation the remote access users can get the seamless access to the enterprise network from their PCs. This means that network drives can be mapped directly into the computer, providing access to network-based files from any application. 4.1.2 Security requirements Client-based VPN solution which is based on PPTP or L2TP VPNs is a good choice for remote access connections with low security requirements, since the used authentication and encryption algorithms are weak [2] [9]. Client-based VPN solution which is based on IPSec or SSL VPNs or Web-based VPN solution which is based on SSL VPN is a good choice for remote access connections with high security requirements, since both of them are using strong authentication and encryption algorithms [2] [10]. 4.1.3 Protocols support requirements Client-based VPN solution which is based on IPSec or SSL VPNs or Web-based VPN solution which is based on SSL VPN is a good choice for remote access connections with low protocols support requirements, where the only packets of TCP/IP network protocol are forwarded through the WAN. Client-based VPN solution which is based on PPTP or L2TP VPNs is a good choice for remote access connections with high protocols support requirements, where the packets of multiple network protocols such as TCP/IP, IPX/SPX, or NetBEUI are forwarded through the WAN. 4.1.4 Cost requirements Web-based VPN solution which is based on SSL VPN is well suited for remote access connections with low cost requirements, since there is only need to web browser in order to establish connection to the enterprise network. Client-based VPN solution which is based on PPTP, L2TP, IPSec, or SSL VPNs is well suited for remote access connections with high cost requirements, since there is a
need to install or configure a client in order to establish connection to the enterprise network. 4.1.5 Remote Access VPN Matrix Table (2) shows the remote access VPN Matrix That is used to help enterprises for selecting the proper remote access VPN solution. Table (2) Remote Access VPN Matrix Requirements Value Proper solution Low (web-based Web-based VPN solution applications) based on SSL VPN Client-based VPN Access High (seamless solution based on PPTP, network access) L2TP, IPSec, or SSL VPNs Client-based VPN Low (weak solution based on PPTP protocols) or L2TP VPNs Client-based VPN Security solution based on IPSec High (strong or SSL VPNs protocols) Web-based VPN solution based on SSL VPN Client-based VPN solution based on IPSec Low (only or SSL VPNs TCP/IP) Protocols Web-based VPN solution support based on SSL VPN High (TCP/IP, Client-based VPN solution based on PPTP IPX/SPX, or or L2TP VPNs NetBEUI) Low (web Web-based VPN solution browser) based on SSL VPN Client-based VPN Cost High (client solution based on PPTP, software) L2TP, IPSec, or SSL VPNs 4.1.6 Remote Access VPN Formula To extract remote access VPN logic Formula, we will refer to the remote access VPN solutions by the symbols shown in table (3) and to the remote access VPN requirements by the symbols shown in table (4). Table (3) Remote Access VPN solutions Symbols Remote Access VPN solutions Symbol Client-based VPN solution based on cPPTP PPTP VPN Client-based VPN solution based on cL2TP L2TP VPN Client-based VPN solution based on cIPSec IPSec VPN
311
Client-based VPN solution SSL VPN Web-based VPN solution SSL VPN Client-based VPN solution PPTP/IPSec VPN Client-based VPN solution L2TP/IPSec VPN
Table (4) Remote Access VPN requirements Symbols requirement Symbol 0 (Low - web-based applications) Access A 1 (High - seamless network access) 0 (Low - weak protocols) Security S 1 (High - strong protocols) 0 (Low - only TCP/IP) Protocols P 1 (High - TCP/IP, IPX/SPX, or Support NetBEUI) 0 (Low - web browser) Cost C 1 (High - client software) Tables (2), (3), and (4) are used to construct the following remote access VPN requirements logic equations: Access = A . ( cPPTP + cL2TP + cIPSec + cSSL + cPPTP/IPSec + cL2TP/IPSec ) + A . ( wSSL ) (1) Security = S . ( wSSL + cIPSec + cSSL + cPPTP/IPSec + cL2TP/IPSec ) + S . ( cPPTP + cL2TP ) (2) Protocols = P . ( cPPTP + cL2TP + cPPTP/IPSec + cL2TP/IPSec ) + P . ( wSSL + cIPSec + cSSL ) (3) Cost = C . ( cPPTP + cL2TP + cIPSec + cSSL (4) + cPPTP/IPSec + cL2TP/IPSec ) + C . ( wSSL ) By taking the common terms using intersection operation from (1) and (2) we get: AS = A . S . ( cIPSec + cSSL + cPPTP/IPSec + cL2TP/IPSec ) + A . S . ( cPPTP + cL2TP ) + A . S . ( wSSL ) + A . S . ( 0 ) (5) By taking the common terms using intersection operation from (5) and (3) we get: ASP = A . S . P . ( cPPTP/IPSec + cL2TP/IPSec ) + A . S . P . ( cIPSec + cSSL ) + A . S . P . (cPPTP + cL2TP ) + A . S . P . ( 0 ) + A . S . P . ( 0 ) + A . S . P . ( wSSL ) (6) By taking the common terms using intersection operation from (6) and (4) we get: ASPC = A . S . P . C . ( cPPTP/IPSec + cL2TP/IPSec ) + A . S . P .C . ( 0 ) + A . S . P . C . ( cIPSec + cSSL ) + A . S . P .C . ( 0 )
+ A . S . P . C . ( cPPTP + cL2TP ) + A . S . P . C . ( 0 ) +A . S . P . C . ( 0 ) + A . S . P . C . ( wSSL ) (7) By rearranging the equation (7) we can get the following Proper remote access VPN logic formula: Remote access VPN formula = A . S . P . C . ( cPPTP/IPSec + cL2TP/IPSec ) + A . S . P . C . ( cIPSec + cSSL ) + A . S . P . C . ( cPPTP + cL2TP ) + A . S . P . C . ( wSSL ) (8)
312
4.2.4 Protocols support requirements Secure VPN solution which is based on IPSec or SSL VPNs is a good choice for site-to-site connections with low protocols support requirements, where the only packets of TCP/IP network protocol are forwarded through the WAN. Trusted VPN solution which is based on MPLS or Secure VPN solution which is based on PPTP or L2TP VPNs is a good choice for site-to-site connections with high protocols support requirements, where the packets of multiple network protocols such as TCP/IP, IPX/SPX, or NetBEUI are forwarded through the WAN. 4.2.5 Site-to-Site VPN Matrix Table (5) shows the site-to-site VPN Matrix that is used to help enterprises for selecting the proper site-site VPN solution. Table (5) Site-to-Site VPN Matrix Requirements Value Proper solution Secure VPN solution Low based on PPTP, (best effort) L2TP, IPSec, or SSL QoS VPNs High Trusted VPN solution (class of service) based on MPLS VPN Secure VPN solution Low based on PPTP, (hup-and-spoke) L2TP, IPSec, or SSL Topology VPNs High Trusted VPN solution (spoke-and-spoke) based on MPLS VPN (separation of Trusted VPN solution traffic) based on MPLS VPN Low Secure VPN solution (weak based on PPTP or Security protocols) L2TP VPNs Secure VPN solution High based on IPSec or (strong protocols) SSL VPNs Secure VPN solution Low based on IPSec or (only TCP/IP ) SSL VPNs Protocols Trusted VPN solution support based on MPLS VPN High (TCP/IP, IPX/SPX, Secure VPN solution or NetBEUI) based on PPTP or L2TP VPNs 4.2.6 Site-to-Site VPN Formula To extract site-to-site VPN logic Formula, we will refer to the site-to-site VPN solutions by the symbols shown in table (6) and to the site-to-site VPN requirements by the symbols shown in table (7).
Table (6) Site-to Site VPN solutions Symbols Site-to-Site VPN solutions Symbol Secure VPN solution based on PPTP sPPTP VPN Secure VPN solution based on L2TP sL2TP VPN Secure VPN solution based on IPSec sIPSec VPN Secure VPN solution based on SSL sSSL VPN Trusted VPN solution based on tMPLS MPLS VPN Secure VPN solution based on sPPTP/IPSec PPTP/IPSec VPN Secure VPN solution based on sL2TP/IPSec L2TP/IPSec VPN Hybrid VPN solution based on hPPTP/MPLS PPTP/MPLS VPN Hybrid VPN solution based on hL2TP/MPLS L2TP/MPLS VPN Hybrid VPN solution based on hIPSec/MPLS IPSec/MPLS VPN Hybrid VPN solution based on hSSL/MPLS SSL/MPLS VPN Hybrid VPN solution based on hPPTP/IPSec/MPLS PPTP/IPSec/MPLS VPN Hybrid VPN solution based on hL2TP/IPSec/MPLS L2TP/IPSec/MPLS VPN Table (7) Site-to-Site VPN requirements Symbols Requirement Symbol QoS Topology Security Protocols Support Q 0 (Low best effort) 1 (High class of service) 0 (Low hup-and-spoke) T 0 (High Spoke-and-spoke) 0 (Low separation of traffic or weak S protocols) 1 (High - strong protocols) 0 (Low - only TCP/IP) P 1 (High - TCP/IP, IPX/SPX, or NetBEUI)
Tables (5), (6), and (7) are used to construct the following site-to-site VPN requirements logic equations: QoS = Q . ( tMPLS + hPPTP/MPLS + hL2TP/MPLS + hIPSec/MPLS + hSSL/MPLS + hPPTP/IPSec/MPLS + hL2TP/IPSec/MPLS ) + Q . ( sPPTP + sL2TP + sIPSec + sSSL + sPPTP/IPSec + sL2TP/IPSec ) (9) Topology = T . ( tMPLS + hPPTP/MPLS + hL2TP/MPLS + hIPSec/MPLS + hSSL/MPLS + hPPTP/IPSec/MPLS + hL2TP/IPSec/MPLS )
313
+ T . ( sPPTP + sL2TP + sIPSec + sSSL + sPPTP/IPSec + sL2TP/IPSec ) (10) Security = S . ( sIPSec + sSSL + sPPTP/IPSec + sL2TP/IPSec + hIPSec/MPLS + hSSL/MPLS + hPPTP/IPSec/MPLS + hL2TP/IPSec/MPLS) + S . ( sPPTP + sL2TP + tMPLS + hPPTP/MPLS + hL2TP/MPLS ) (11) Protocols = P . ( sPPTP + sL2TP + sPPTP/IPSec + sL2TP/IPSec + tMPLS + hPPTP/MPLS + hL2TP/MPLS + hPPTP/IPSec/MPLS + hL2TP/IPSec/MPLS ) + P . ( sIPSec + sSSL + hIPSec/MPLS + hSSL/MPLS ) (12) By taking the common terms using intersection operation from (9) and (10) we get: QT = Q. T . ( tMPLS + hPPTP/MPLS + hL2TP/MPLS + hIPSec/MPLS + hSSL/MPLS + hPPTP/IPSec/MPLS + hL2TP/IPSec/MPLS ) + Q. T . ( 0 ) + Q . T ( 0 )
+ Q . T . (sPPTP + sL2TP + sIPSec + sSSL + sPPTP/IPSec + sL2TP/IPSec ) (13) By taking the common terms using intersection operation from (13) and (11) we get: QTS = Q. T . S . ( hIPSec/MPLS + hSSL/MPLS + hPPTP/IPSec/MPLS + hL2TP/IPSec/MPLS ) + Q . T . S . ( tMPLS + hPPTP/MPLS + hL2TP/MPLS ) + Q . T . S . ( sIPSec + sSSL + sPPTP/IPSec
+ sL2TP/IPSec ) + Q . T . S . ( sPPTP + sL2TP ) (14) By taking the common terms using intersection operation from (14) and (12) we get: QTSP = Q. T . S . P . ( hPPTP/IPSec/MPLS + hL2TP/IPSec/MPLS) + Q. T . S . P . ( hIPSec/MPLS + hSSL/MPLS ) + Q . T . S . P . ( tMPLS + hPPTP/MPLS + hL2TP/MPLS) + Q . T . S . P . ( 0 ) + Q . T . S . P . ( sPPTP/IPSec + sL2TP/IPSec )
+ Q . T . S . P . ( sIPSec + sSSL ) + Q . T . S . P . (sPPTP + sL2TP )
+Q. T . S . P . ( 0 ) (15) By rearranging the equation (15) we can get the following Proper site-to-site VPN solution logic equation : Site-to-site VPN formula = Q . T . S . P . ( hPPTP/IPSec/MPLS + hL2TP/IPSec/MPLS ) + Q . T . S . P . ( hIPSec/MPLS + hSSL/MPLS ) + Q . T . S . P . ( tMPLS + hPPTP/MPLS + hL2TP/MPLS ) + Q . T . S . P . ( sPPTP/IPSec + sL2TP/IPSec )
+ Q . T . S . P . ( sIPSec + sSSL ) + Q . T . S . P . ( sPPTP + sL2TP )
(16)
References
[1] R. Fisli, Secure Corporate Communications over VPN-Based WANs, Masters Thesis in Computer Science at the School of Computer Science and engineering, Royal Institute of Technology, sweden, 2005. [2] J. C. Snader, VPNs ILLUSTRATED: Tunnels, VPNs, and IPSec, Addison-Wesley, 2006. [3] K.n Hamzeh, G. S. Pall, W. Verhein, J. Taarud, W. A. Little, and G. Zorn, Point to Point Tunneling Protocol (PPTP), IETF RFC 2637, July 1999. [4] W. Townsley, A. J. Valencia, A. Rubens, G. S. Pall, G. Zorn, and B. Palter, Layer Two Tunneling Protocol (L2TP), IETF RFC 2661, August 1999. [5] IETF RFCs 2401-2411, and 2451, IPSec, 1999. [6] O. Freier, P. Karlton, and P. C. Kocker, The SSL Protocol: Version 3.0, IETF RFC draft-freier-ssl-version3-02, November 1996. [7] E. C. Rosen, Y. Rekhter, BGP/MPLS VPNs, IETF RFC 2547, March 1999. [8] VPN Consortium home page, www.vpnc.org. [9] Schneier, and Mudge, Cryptanalysis of Microsofts Point-toPoint Tunneling Protocol (PPTP), Proceeding of the 5th ACM Conference on Communication and Computer Security, pp. 132-141 ACM Press, 1998. [10] Wanger, and Schneier, Analysis of the SSL 3.0 protocol, The Second USENIX Workshop on Electronic Commerce Proceedings, pp. 29-40, 1996.
314