1 / 14

VPN TUNNELING PROTOCOLS

VPN TUNNELING PROTOCOLS. PPTP, L2TP, L2TP/IPsec. Ashkan Yousefpour Amirkabir University of Technology. Today’s Overview . Why using VPNs?. fast , secure and reliable connection between separated networks full access on resources from everywhere -> building a virtual local connection

gwidon
Download Presentation

VPN TUNNELING PROTOCOLS

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec AshkanYousefpour Amirkabir University of Technology

  2. Today’s Overview

  3. Why using VPNs? fast, secure and reliable connection betweenseparated networks full access on resources from everywhere ->building a virtual local connection reasonable access: building connection onlyto local ISP

  4. PPTP - enables secure data transfers between a remote client and an enterprise server by creating a VPN across an IP-based internetwork

  5. Point-to-Point Tunneling Protocol (PPTP) [RFC 2637] • Standard method for transporting multiprotocol datagrams over point-to-point links • Mainly implemented and used by Microsoft • Extension of PPP • Allows tunneling of PPP datagrams over IP networks • Easy to use and to implement • Use of 2 connections • Control connection • Tunnel connection • Operates at layer 2 of OSI • Uses TCP Port 1723

  6. Point-to-Point Tunneling Protocol (PPTP) [RFC 2637] - continued • PPTP is a tunneling protocol provided by Microsoft, which provides remote users, encrypted, multi protocol access to a corporate network over the Internet. • It encapsulates PPP frames in IP data grams • Microsoft’s implementation of PPTP has been found to have several problems that make it vulnerable to attacks, and it also lakes the scalability in that it only supports 255 concurrent connections per server. • Require an IP Network between PPTP Client and PPTP Server ( either LAN or dial- up) • PPTP can support only one tunnel at a time for each user.

  7. PPTP • Uses Generic Routing Encapsulation (GRE) to carry PPP packets • PPP payload can be encrypted and/or compressed • GRE header contains information about tunnel protocol and encryption algorithm • Structure of PPTP packet:

  8. Layer 2 Tunneling Protocol (L2TP) [RFC 2661] • Uses UDP • Can be transported over IP, Frame Relay, ATM, X.25, ... • Allows multiple tunnels with multiple sessions inside every tunnel • UDP Port 1701 • Commonly used with IPsec -> L2TP/IPsec

  9. Layer 2 Tunneling Protocol (L2TP) [RFC 2661]Continued • Structure of L2TP packet:

  10. Layer 2 Tunneling Protocol (L2TP) [RFC 2661]Continued • A hybrid of Microsoft’s PPTP and Cisco Systems’ Layer 2 Forwarding - L2F protocol • can support multiple, simultaneous tunnels for each user. • It Uses UDP and supports any routed protocol, including IP, IPX and AppleTalk, including frame relay, ATM, X. 25 • Because of L2TP’s use of PPTP, it is included as part of the remote access features of most Windows Products • It does not provide cryptographically key security features

  11. Layer 2 Tunneling Protocol (L2TP) [RFC 2661]Continued • L2TP allows multiprotocol traffic to be encrypted and then sent over any medium that supports point-to-point datagram delivery, such as IP or asynchronous transfer mode (ATM). • L2TP is a combination of PPTP and Layer 2 Forwarding (L2F), a technology developed by Cisco Systems, Inc. • It can support IPsec for data encryption and integrity

  12. L2TP/IPsec • Uses IPsec Encapsulating Security Payload (ESP) • an IPsec Authentication trailer provides message integrity and authentication • Structure of encrypted packet:

  13. L2TP/IPsec vs. PPTP

  14. Thank You! Any Questions?

More Related