Premium VPN
Premium VPN
Premium VPN
Done By:
Abdel-Wahab Mahmoud
Abdel-Rahman Mohammed
Ali Hamed
Mohammed Belal
Mustafa Atallah
• Site-to-siteVPN
Remote access VPN
• It allows a user to connect to a private network and access its services and
resources remotely.
• The connection between the user and the private network happens
through the Internet and the connection is secure and private due to
tunnel.
• Example: A corporate employee, while traveling, uses a VPN to connect
to his/her company’s private network and remotely access files and
resources on the private network.
Site-to-site VPN
• It is also called as Router-to-Router VPN and is mostly used in the
corporates.
• When multiple offices of the same company are connected using Site-to-
SiteVPN type, it is called as Intranet basedVPN.
• When companies use Site-to-siteVPN type to connect to the office of
another company, it is called as Extranet basedVPN.
• It create a virtual bridge between the networks at geographically distant
offices and connect them through the Internet and maintain a secure and
private communication between the networks.
VPN Tunneling
• Tunneling is a protocol that allows for the secure movement of data from one
network to another.
• Tunneling involves allowing private network communications to be sent across a
public network, such as the Internet, through a process called encapsulation.
• The encapsulation process allows for data packets to appear as though they are of
a public nature to a public network when they are actually private data packets,
allowing them to pass through unnoticed.
• Tunneling is also known as port forwarding.
Tunneling
VPN protocol
🠶 SSL andTLS protocol is most commonly used by online shopping websites and service providers.
🠶 SSL connections have https in the beginning of the URL instead of http.
Advantages of VPN
• Greater scalability
• Reduced long-distance telecommunications costs
• Remote controlling
• Security
• Online anonymity
• Unlock restricted content
Disadvantages of VPN
• Public
• Un-trusted
• Unreliable IP networks
• Data integrity
The contents of a packet can be accidentally or deliberately modified.
• Identity spoofing
The origin of an IP packet can be forged.
• Anti-reply attacks
Unauthorized data can be retransmitted.
• Loss of privacy
The contents of a packet can be examined in transit.
Understanding TCP/IP
OSI Reference Model
Presentation Layer
Session Layer
Network Layer IP
Original
Application Layer
Message
• IP security (IPsec)
• Two protocols
• Authentication protocol, using anAuthentication Header (AH)
• Encryption/authentication protocol, called the Encapsulating Security Payload (ESP)
• Two modes of operation
• Transport mode: provides protection for upper-layer protocols
• Tunnel mode: protects the entire IP datagram
IPSec protocols – AH protocol
• AH - Authentication Header
• Defined in RFC 1826
• Integrity:Yes, including IP header
• Authentication:Yes
• Non-repudiation: Depends on cryptography algorithm.
Transport Packet layout
• Encryption: No
IP Header AH Header Payload (TCP, UDP, etc)
• Replay Protection:Yes
Tunnel Packet layout
IP Header AH Header IP Header Payload (TCP. UDP,etc)
IPSec protocols – ESP protocol
• ESP – Encapsulating Security Payload
• Defined in RFC 1827
• Integrity:Yes
• Authentication: Depends on cryptography algorithm.
• Non-repudiation: No
Tunnel Packet layout
• Encryption: Yes
IP Header ESP Header Payload (TCP, UDP, etc)
• Replay Protection:Yes
Tunnel Packet layout
IP Header ESP Header IP Header Payload (TCP. UDP,etc)
Unencrypted Encrypted
What protocol to use?
Transport Mode:
• Used for Peer to Peer communication security
• Data is encrypted
Tunnel Mode:
• Used for site-to-site communication security
• Entire packet is encrypted.
IPSec Modes of Operation
• Transport Mode: protect the upper layer protocols
Original IP IP TCP Data
Datagram Header Header
protected
Tunnel Mode: protect the entire IP payload
protected
Transport versus Tunnel mode (cont)
Transport mode is used when the cryptographic endpoints are also the communication endpoints of the
secured IP packets.
Cryptographic endpoints: The entities that generate / process an IPSec header (AH or ESP)
Communication endpoints: Source and Destination of an IP packet
Transport versus Tunnel mode (cont)
Tunnel mode is used when at least one cryptographic endpoint is not a communication endpoint of the
secured IP packets.
• Host-to-Network, Network-to-Network
Application Application
Layer Layer
Protected Protected
Transport Data Data Transport
Layer Layer
Interne
IP t IP
Layer Layer
SG = Security Gateway
Transport Mode
• Host-to-Host
IPSec IPSec
IP Layer IP Layer
Data Link Layer Data Link Layer
Host A Host B
Transport Mode
Tunneling Mode
Outbound/Inbound IPSec Processing
Packet
Packet SAD
SAout
SPD
IPSec policies
SPD = Security Policy Database
SAD = Security Association Database
SA = Security Association
Inbound IPSec Processing
Packet Case 2:
If IPSec headers are absent
1. SPD is consulted to
determine the type of
service to afford this packet.
2. If certain traffic is required
to be IPSec protected and its
not it must be dropped.
SPD
IPSec policies
SPD = Security Policy Database
SAD = Security Association Database
SA = Security Association
Real World Deployment E xamples
Encrypted / Authenticated
• VPNs Internet
SG
• Wireless
Internet
Conclusion