Presentation is loading. Please wait.

Presentation is loading. Please wait.

A Performance Analysis of Gateway- to-Gateway and End-to-Gateway L2TP VPN Author: Rukhsana Rahim Butt.

Similar presentations


Presentation on theme: "A Performance Analysis of Gateway- to-Gateway and End-to-Gateway L2TP VPN Author: Rukhsana Rahim Butt."— Presentation transcript:

1 A Performance Analysis of Gateway- to-Gateway and End-to-Gateway L2TP VPN Author: Rukhsana Rahim Butt

2 Dec, 2006COMSATS Institue of Information Technology 2 Abstract L2TP Communication Modes behave differently on real and non-real applications. Detailed analysis for administrator is needed prior to VPN Mode deployment. This study can be beneficial for –Financial growth. –Saving bandwidth. –Client satisfaction.

3 Dec, 2006COMSATS Institue of Information Technology 3 Paper Overview Paper Goal –Provide basic understanding of communication Modes, current development and missing aspects/loopholes. –Effect of these technologies’ on various applications. – How these technologies fit together to provide today’s VPN solutions. Approach –Simulation of L2TP Tunnel and measurement of capacity using OPNET

4 Dec, 2006COMSATS Institue of Information Technology 4 What and Why?

5 Dec, 2006COMSATS Institue of Information Technology 5 How L2TP/IPSec Secure WLAN? Strong encryption, integrity, user authentication, replay protection, tunnel address assignment, multi-protocol and multi- vendor interoperability. Mitigate attacks like –Wireless Packet Sniffer –Unauthorized Access –Network Topology Discovery –Password Attack

6 Dec, 2006COMSATS Institue of Information Technology 6 L2TP Communication Modes Gateway-to-Gateway Mode –Compulsory Tunnel End-to-Gateway Mode –Voluntary Tunnel

7 Dec, 2006COMSATS Institue of Information Technology 7 Voluntary Tunnel Vs Compulsory Tunnel

8 Dec, 2006COMSATS Institue of Information Technology 8 Current Information General Tunnel Setup guideline Security breaches against Tunnels General Communication Mode Information

9 Dec, 2006COMSATS Institue of Information Technology 9 What is Missing? Communication Modes’ Behavior vs. Applications –Analysis –Comparison –Suited Communication Mode against Applications (real & non-real)

10 Dec, 2006COMSATS Institue of Information Technology 10 Voice Received Traffic of Voluntary and Compulsory Tunnels (RFC 2764)

11 Dec, 2006COMSATS Institue of Information Technology 11 Voice Received Traffic of Voluntary and Compulsory Tunnels (RFC 2764)

12 Dec, 2006COMSATS Institue of Information Technology 12 Voice Throughput of Voluntary and Compulsory Tunnels (RFC 2764)

13 Dec, 2006COMSATS Institue of Information Technology 13 Requirements for Performance Analysis High End-to-End Delay Less Receiving Traffic Retrieved Overall throughput decline on PPP and Tunnel links

14 Dec, 2006COMSATS Institue of Information Technology 14 Why Gateway-to-Gateway communication mode not suited for Voice Application? Communication Mode is time-taken High End-to-End Delay Less Receiving Traffic Tunnel Sharing Less throughput on PPP Link Less throughput on Tunnel Link

15 Dec, 2006COMSATS Institue of Information Technology 15 Conclusion The End-to-Gateway communication mode/ the Voluntary Tunnel of L2TP exposes better response in case of real applications.

16 Dec, 2006COMSATS Institue of Information Technology 16 Future Work Quantitative Analysis of Wireless LAN Security and Performance via VPN Technology L2TP/IPSec

17 Thanks Any Question ?


Download ppt "A Performance Analysis of Gateway- to-Gateway and End-to-Gateway L2TP VPN Author: Rukhsana Rahim Butt."

Similar presentations


Ads by Google