1 / 13

Evaluation of an internet protocol security based virtual private network solution

Helsinki University of Technology Networking laboratory Master’s thesis seminar 25.5.2004. Evaluation of an internet protocol security based virtual private network solution. Thesis written by Arto Laukka at TeliaSonera Finland Oyj Supervisor Professor Raimo Kantola

Download Presentation

Evaluation of an internet protocol security based virtual private network solution

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Helsinki University of Technology Networking laboratory Master’s thesis seminar 25.5.2004 Evaluation of an internet protocol security based virtual private network solution Thesis written by Arto Laukka at TeliaSonera Finland Oyj Supervisor Professor Raimo Kantola Instructor M.Sc. Ville Hapuoja

  2. Introduction IPsec is current best practise solution for implementing virtual private networks over the public Internet IPsec solutions are classified in two categories • GW-to-GW • Client-to-GW (remote access) Service operators offer IPsec VPN-solutions for corporate customers Object of the thesis: Evaluate if a new service platform is ready to be used in commercial service production for IPsec client-to-GW VPN service. Methods include a literature study on IPsec service components and IPsec client-to-GW service architecture. The characteristics of the new platform are evaluated based on vendor documentation and example configurations.

  3. Agenda • Introduction • IPsec client-to-GW VPN service architecture • IP service switch concept • Concept evaluation • Technical evaluation • Problem with IPsec and NAT • Conclusions

  4. IPsec client-to-GW VPN service architecture (1/2) • The public Internet or other insecure network enables connectivity • IPsec client is typically a piece of software installed in a client machine • VPN gateway terminates the IPsec client connections • Authentication infrastructure, for example PKI, is required for strong client authentication • Authorisation infrastructure is needed for access control • Management infrastructure for all the blocks mentioned above • Protected network contains the secured network services offered to the clients

  5. IPsec client-to-GW VPN service architecture (2/2)

  6. IP service switch concept (1/2) • Traditionally IP services have been implemented with dedicated CPE appliances • The IP service switch concept is combines many of these services into a single appliance • Services are offered in the service provider network instead of customer premises • Reduces the amount of equipment, integrates services management and makes service provisioning easier

  7. IP service switch concept (2/2) Legacy CPE implementation Service switch implementation

  8. Evaluation of the concept • The IP service switch concept introduces an opportunity for service providers through smaller capital and operational costs • The concept offers scalability in amount of served subscribers, service offering and management • Introduces a possible single point of failure • The performance of a multifunctional device does not achieve the performance of dedicated service appliances

  9. Technical evaluation of the new platform (1/2) • The platform under evaluation is CoSine Communications IP Processing Switch IPSX 3500, a multifunctional IP service switch • The characteristics of the IPsec VPN GW functionality of the CoSine platform are evaluated • Starting point is the current service implementation and functionality • Integration of the existing authentication, authorisation, management and network infrastructure should be seamless • Performance should be adequate for mass-scale IPsec service production

  10. Technical evaluation of the new platform (2/2) • The CoSine platform has all the basic IPsec VPN GW functionality • Necessary functions and interfaces for integration to the service operator network and infrastructure exist • The CoSine platform offers provider class performance in IPsec tunnel termination and encryption • Main problem in technical implementation is the NAT-Traversal solution • Inconsistent NAT-T solution leads to interoperability problems

  11. Problem with IPsec and NAT (1/2) • Network address translation is everywhere in the Internet • NAT modifies the IP address and port fields in the IP header and in some cases in the IP payload • NAT cannot modify IPsec protected packet because of the encryption or checksum calculation.

  12. Problem with IPsec and NAT (2/2) • No existing standard for implementing IPsec NAT Traversal • Several vendor specific solutions exist, no guarantee of interoperability • CoSine’s NAT Traversal solution based on early IETF drafts • No complete NAT-T implementation in CoSine for pure IPsec tunnel implementation • The NAT Traversal solution has to be the same at both ends of the IPsec VPN tunnel • CoSine is not interoperable with the current IPsec client-to-GW VPN service

  13. Summary The IP service switch concept has lots of potential. The performance, scalability and other characteristics of the CoSine platform are adequate for mass-scale IP service delivery. Interoperability problems exist with NAT-T and IPsec tunnel mode. Deployment of the CoSine platform would require rethinking of the other service components and service functionality. The standardisation of the IPsec NAT-Traversal is still unfinished at IETF. As long as this is the case the interoperability problems will exist.

More Related