Presentation is loading. Please wait.

Presentation is loading. Please wait.

Understanding “Virtual” Networks J.J. Ekstrom Fall 2011.

Similar presentations


Presentation on theme: "Understanding “Virtual” Networks J.J. Ekstrom Fall 2011."— Presentation transcript:

1 Understanding “Virtual” Networks J.J. Ekstrom Fall 2011

2 Understanding VLANs, Tunnels and VPNs Dest MAC0x8100Source Mac Payload Ether CRCDest MAC Old Ether type Source Mac Ethernet II packet 802.3 packet Len < 1500 Payload Ether CRCDest MAC Ether type > 1500 Source Mac Pad 802.1p/Q packet Ether CRC VLAN Tag 4bits priority 12 bits VLAN # Payload Pad Link to: IANA EtherType List VLAN Tag VLANs separate Traffic, but access to wire gives access to data.

3 VPN not Necessarily Secure Payload Ether CRC Dest MACIPSource Mac LTTP packet (Layer 2 Tunneling Protocol) IP Header/ UDP Payload Ether CRCDest MAC Ether type > 1500 Source Mac Pad Payload Ether CRC Dest MACIPSource Mac LTTP packet (Layer 2 Tunneling Protocol) IP Header/ UDP Payload Ether CRCDest MAC Ether type > 1500 Source Mac Pad However payload can be encrypted which reveals pipe but not the contents

4 MPLS: VLANS on the WAN Ethernet II packet Payload Ether CRCDest MAC Ether type > 1500 Source Mac Pad MPLS Label Edge Router Label Switch Router Label Switch Router Label Switch Router Label Switch Router Label Switch Router Label Switch Router Label Switch Router Label Switch Router Puts on Label Takes off Label and decrypts if necessary Just uses Label Can encrypt for security

5 MPLS Mappings VLAN tag to MPLS Label IP subnet to MPLS Label IP Destination subnet to MPLS Label Can be different depending on content. ◦ Encrypt some packets not others.

6 Tunneling (SSL) Treating a stream like a wire. SSL (Secure Sockets Layer) ◦ OpenSSL has tunneling built in. ◦ In on local port tunneled to destination IP and port. ◦ Travels through a virtual wire on port 80 ◦ Looks like http traffic

7 Virtual Private Networks Typically Encrypted Encapsulate a packet in another protocol’s payload.

8 Generalizations VPN, VLANs, MPLS, L2TP are all variations on a theme of “tunnel” Tunnels can be used for various things: ◦ Routing simplification ◦ Encryption ◦ Traffic management ◦ …


Download ppt "Understanding “Virtual” Networks J.J. Ekstrom Fall 2011."

Similar presentations


Ads by Google