ip vpn overview
DESCRIPTION
VPNTRANSCRIPT
HUAWEI TECHNOLOGIES CO., LTD.
www.huawei.com
Huawei Confidential
Security Level:
英文标题 :40-47pt
副标题 :26-30pt
字体颜色 : 反白内部使用字体 :
FrutigerNext LT Medium
外部使用字体 : Arial
中文标题 :35-47pt
字体 : 黑体 副标题 :24-28pt
字体颜色 : 反白字体 : 细黑体
IP VPN Overview
ISSUE 1.0
HUAWEI TECHNOLOGIES CO., LTD. Page 2Huawei Confidential
Foreword
VPN this technology has widely used in today
network. Along with the increasingly wide
application of the Internet, Virtual Private Network
(VPN) emerged to construct private networks on
public networks. “Virtual” here mainly indicates
that VPN is a kind of logical networks.
HUAWEI TECHNOLOGIES CO., LTD. Page 3Huawei Confidential
Objectives
Describe the concept of VPN and the types
of VPN
Describe the protocols realized the IP VPN
HUAWEI TECHNOLOGIES CO., LTD. Page 4Huawei Confidential
Chapter 1 VPN System OverviewChapter 1 VPN System Overview
Chapter 2 VPN Working MechanismChapter 2 VPN Working Mechanism
HUAWEI TECHNOLOGIES CO., LTD. Page 5Huawei Confidential
VPN Definition
VPN—Virtual Private Network Private network can be established on public network. "Virtual" here mainly indicates: this network is a kind
of logical network.
HUAWEI TECHNOLOGIES CO., LTD. Page 6Huawei Confidential
Internet
VPN Definition
Employees inbusiness trips
Tunnel
Leased line
Office
Headquarter
Branch
Partner
Remote office
HUAWEI TECHNOLOGIES CO., LTD. Page 7Huawei Confidential
VPN Features
Private : VPN is only be used by VPN users Virtual : this network is a kind of logical network. Specific: VPN is especially for specific enterprises or us
ers.
HUAWEI TECHNOLOGIES CO., LTD. Page 8Huawei Confidential
VPN Advantages
Reliable and safe connection
Flexible application of VPN
Creating VPN with service quality guarantee
Supporting the mobile access of foreign VPN users
Greatly improve utility of network resources, increase profit of the Internet Service Provider (ISP) accordingly.
HUAWEI TECHNOLOGIES CO., LTD. Page 9Huawei Confidential
Classification of VPN
IP VPN can be classified according to Operation Mode
,Service Application, Networking Mode, Realization Layer
,Connection Orientation Classified According to Operation Mod
VPNCPE-based VPN (Customer Premises Equipment based VPN) Network-based VPN (NBIP-VPN)
HUAWEI TECHNOLOGIES CO., LTD. Page 10Huawei Confidential
Classification of VPN
Based on the Service applications : Access VPN Intranet VPN Extranet VPN
HUAWEI TECHNOLOGIES CO., LTD. Page 11Huawei Confidential
Access VPN
Dial network expansion: Employees on errands Remote small office
POP
POP
Originated by user
POP
Originated by ISP
HQ
Tunnel
HUAWEI TECHNOLOGIES CO., LTD. Page 12Huawei Confidential
Intranet VPN
Internet/ ISP IPATM/FR
Tunnel
HQ
Research Institute
Office
Branch
HUAWEI TECHNOLOGIES CO., LTD. Page 13Huawei Confidential
Extranet VPN
Internet/ ISP IPATM/FR
Branch
Partner
HQ
Remote Office
HUAWEI TECHNOLOGIES CO., LTD. Page 14Huawei Confidential
Classification of VPN
Based on networking Mode : Virtual Leased Line (VLL) Virtual Private Dial Network (VPDN) Virtual Private LAN Segment (VPLS) Virtual Private Routing Network (VPRN)
HUAWEI TECHNOLOGIES CO., LTD. Page 15Huawei Confidential
Classification of VPN
Based on Connection Orientation : Connection-oriented L2VPN Connection-oriented L3VPN
HUAWEI TECHNOLOGIES CO., LTD. Page 16Huawei Confidential
Classification Based on Realization Layer
Layer 2 VPN L2TP: Layer 2 Tunnel Protocol (RFC 2661) PPTP: Point To Point Tunnel Protocol L2F: Layer 2 Forwarding
Layer 3 VPN GRE : General Routing Encapsulation IPSEC : IP Security Protocol
HUAWEI TECHNOLOGIES CO., LTD. Page 17Huawei Confidential
S-MIME, Proxy,SET, Secure-PRC, SOCKSApplication layer
Transport layer
Network layer
Data-link layer
SSL, TLS, SSH
IPSec, GRE, MPLS/VPN
PPTP, L2F, L2TP
Classification Based on Realization Layer
HUAWEI TECHNOLOGIES CO., LTD. Page 18Huawei Confidential
Chapter 1 VPN System Overview
Chapter 2 VPN Working MechanismChapter 2 VPN Working Mechanism
HUAWEI TECHNOLOGIES CO., LTD. Page 19Huawei Confidential
VPN Fundaments
Through PSTN/ISDN network, the user accesses the ISP
NAS (Network Access Server) server. After NAS server
recognizes that this is a VPN user by checking user name
or access number, it establishes a connection to the
user’s destination VPN server, which is called tunnel. NAS will encapsulate the user data into IP packet and
transmit it to the VPN server through this tunnel. VPN server will remove the encapsulation to get the
original data after receiving this IP packet, and vice versa.
HUAWEI TECHNOLOGIES CO., LTD. Page 20Huawei Confidential
Tunnel
A tunnel is a logical extension for their PSTN/ISDN links
and the operation is the same as the physical links. Tunneling can be implemented based on a tunneling
protocol. Tunneling protocols can be divided into :
a. Layer 2 tunneling protocol
b. Layer 3 tunneling protocol.
HUAWEI TECHNOLOGIES CO., LTD. Page 21Huawei Confidential
Layer 2 Tunneling Protocol
Point-to-Point Tunneling Protocol (PPTP)
Layer 2 Forwarding (L2F)
Layer 2 Tunneling Protocol (L2TP)
HUAWEI TECHNOLOGIES CO., LTD. Page 22Huawei Confidential
Layer 3 Tunneling Protocol
Generic Routing Encapsulation RE (GRE ) IP Security (IPSec) ESP (Encapsulating Security Payload) IKE (Internet Key Exchange)
HUAWEI TECHNOLOGIES CO., LTD. Page 23Huawei Confidential
PPTP
Point-to-Point Tunneling Protocol Supported by Microsoft, Ascend, 3COM and other companies
and supported by Windows NT 4.0 and upper versions This protocol supports tunneling encapsulation of point-to-
point PPP in IP network PPTP uses an enhanced Generic Routing Encapsulation
(GRE) technology to provide encapsulation service of flow
control and congestion control for transmitted PPP packet.
HUAWEI TECHNOLOGIES CO., LTD. Page 24Huawei Confidential
L2F
Layer 2 Forwarding Supported by many other companies Supports the tunneling encapsulation for the
higher-level link layer, physically separating the
dial-up server and dial-up protocol connection.
HUAWEI TECHNOLOGIES CO., LTD. Page 25Huawei Confidential
L2TP
Layer 2 Tunneling Protocol Drafted by IETF, Microsoft and other companies and absorbing
the advantages of above two protocols, it is accepted by most
companies and has become the standard RFC Provides both dial-up VPN service and special line VPN service
HUAWEI TECHNOLOGIES CO., LTD. Page 26Huawei Confidential
GRE
Generic Routing Encapsulation Can encapsulate the datagram of some network layer
protocols (e.g. IP and IPX) The tunnel is a virtual point-to-point connection and can be
regarded as virtual interface only supporting point-to-point
connection in actual situation
HUAWEI TECHNOLOGIES CO., LTD. Page 27Huawei Confidential
Tunnel
InternetNovell IPXGroup1
Novell IPXGroup2
RouterA RouterB
Packet Encapsulation and Decapsulation through GRE
HUAWEI TECHNOLOGIES CO., LTD. Page 28Huawei Confidential
GRE’S Application
Novell IPXGroup 1
Novell IPXGroup 2
Tunnel
Internet
IPTerm 1
IPTerm 2
RouterA RouterB
Multi-Protocol Local Network Being Transmitted through Single-Protocol Backbone Network
HUAWEI TECHNOLOGIES CO., LTD. Page 29Huawei Confidential
GRE’S Application
Enlarge Operation Range of the Network with Hop-Limited Protocol
IP Network
IP Network
IP Network
PC PC
Tunnel
HUAWEI TECHNOLOGIES CO., LTD. Page 30Huawei Confidential
GRE’S Application
Connecting Some Discontinuous Sub-Networks to Establish VPN
Tunnel
group2
novellIP Network
group 1
novell
HUAWEI TECHNOLOGIES CO., LTD. Page 31Huawei Confidential
Layer 2 MPLS/VPNThe MPLS network is used to transfer layer 2 data for users transparently. From the perspective of users, MPLS is a layer 2 switching network, through which the layer 2 connection can be established among different stations.
Layer 2 MPLS/VPN modes Martini Kompella CCC VPLS
MPLS/VPN Overview
HUAWEI TECHNOLOGIES CO., LTD. Page 32Huawei Confidential
Layer 3 MPLS/VPNIn the layer 3 MPLS/VPN network, users are provided with VPN services by service providers in such a way that they are not aware of public networks. Users are using an independent network resource.
VPN packet forwarding Two layers of labels are encapsulated. The external-layer label is used for the forwarding of packets on public netw
orks. The internal-layer label is used to indicate the destination station of packets.
MPLS/VPN Overview
HUAWEI TECHNOLOGIES CO., LTD. Page 33Huawei Confidential
MPLS can identify the data packets of different applications. This capability of MPLS ensures the implementation of QoS with simpler methods than that of IP tunnels and VC-based networks.
MPLS segregates the communication signals of irrelevant users and enhances the security.
MPLS-based network differentiates data flows from each other to enhance the security without setting tunnels or encrypting the data.
MPLS VPN meets the requirements of VPN users and reduces the workloads of both the network and users. MPLS VPN can be used to establish any connection with high scalability.
MPLS/VPN Security Advantages
HUAWEI TECHNOLOGIES CO., LTD. Page 34Huawei Confidential
VPN working mechanism
The VPN techniqueSummerySummery
Summery