Understanding “Virtual” Networks J.J. Ekstrom Fall 2011.

Slides:



Advertisements
Similar presentations
MPLS: The Magic Behind the Myths Grenville Armitage (author) Scott Crosby (presenter)
Advertisements

Internetworking II: MPLS, Security, and Traffic Engineering
Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
1 Teredo - Tunneling IPv6 through NATs Date: Speaker: Quincy Wu National Chiao Tung University.
OpenFlow overview Joint Techs Baton Rouge. Classic Ethernet Originally a true broadcast medium Each end-system network interface card (NIC) received every.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Copyright © 2015 John Wiley & Sons, Inc. All rights reserved. 8-1 FitzGerald ● Dennis ● Durcikova Prepared by Taylor M. Wells: College of Business Administration,
IP Version 6 (IPv6) Dr. Adil Yousif. Why IPv6?  Deficiency of IPv4  Address space exhaustion  New types of service  Integration  Multicast  Quality.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
Introducing MPLS Labels and Label Stacks
Network Security Topologies Chapter 11. Learning Objectives Explain network perimeter’s importance to an organization’s security policies Identify place.
1 IP VPN Nikolay Scarbnik. 2 Agenda Introduction………………………………………………………….3 VPN concept definition……………………………………………..4 VPN advantages……………...…………………………………….5.
VLANs Port-based VLAN: switch ports grouped (by switch management software) so that single physical switch …… Switch(es) supporting VLAN capabilities can.
1 Application TCPUDP IPICMPARPRARP Physical network Application TCP/IP Protocol Suite.
Chapter 10 Virtual Private Networks. VPN Defined  A segment of the public network made to appear part of a private network so that it can be used to.
Internet Protocol Security (IPSec)
SMUCSE 8344 MPLS Virtual Private Networks (VPNs).
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Virtual Private Networks (VPN’s)
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
TDRE Filtering and QoS TDRE Version The first choice for the mile p.2 IP filtering >With extended access lists >define in router/trafficPolicy.
DrayTek VPN Solution. Outline What is VPN What does VPN Do Supported VPN Protocol How Many Tunnels does Vigor Support VPN Application Special VPN Application.
Natalie De Koker, Lindsay Haley, Jordan Lunda, Matty Ott.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
OSI Model Routing Connection-oriented/Connectionless Network Services.
Network Redundancy Multiple paths may exist between systems. Redundancy is not a requirement of a packet switching network. Redundancy was part of the.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
Secure connections.
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration VPNs.
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
Bypass a VPN, ACL, and VLAN ECE 4112 Alaric Craig and Pritesh Patel.
Virtual Private Networks Warren Toomey. Available WAN Links.
Fall 2005Computer Networks20-1 Chapter 20. Network Layer Protocols: ARP, IPv4, ICMPv4, IPv6, and ICMPv ARP 20.2 IP 20.3 ICMP 20.4 IPv6.
IT 347 Final Review Winter 2011 J.J. Ekstrom. IT 347 Course Topics Network Models Protocols and Encapsulation Reliable Delivery / Sliding Window Clients,
5: Link Layer Part Link Layer r 5.1 Introduction and services r 5.2 Error detection and correction r 5.3Multiple access protocols r 5.4 Link-Layer.
VPN. What is VPN An arrangement that provides connections between: An arrangement that provides connections between: –Offices –remote workers and –the.
Department of Computer Science Southern Illinois University Edwardsville Spring, 2010 Dr. Hiroshi Fujinoki Tunneling & Virtual.
FINAL YEAR PROJECT. FINAL YEAR PROJECT IMPLEMENTATION OF VPN USING IPSEC.
Chapter 17 Connecting Devices And Virtual LANs 17.# 1
Routers Operate in a Mesh –Many possible alternative routes between two stations Only One of Many Possible Alternative Routes Packet.
Network Layer by peterl. forwarding table routing protocols path selection RIP, OSPF, BGP IP protocol addressing conventions datagram format packet handling.
1 Interview Questions - What is the difference between TCP and UDP? - What is Nagle's Algorithm? - Describe the TCP handshaking process. - What is Slow.
1 VLANs Relates to Lab 6. Short module on basics of VLAN switching.
Virtual Private Networks Ed Wagner CS Overview Introduction Types of VPNs Encrypting and Tunneling Pro/Cons the VPNs Conclusion.
Network Layer by peterl. forwarding table routing protocols path selection RIP, OSPF, BGP IP protocol addressing conventions datagram format packet handling.
The OSI Model An ISO (International standard Organization) that covers all aspects of network communications is the Open System Interconnection (OSI) model.
K. Salah1 Security Protocols in the Internet IPSec.
Virtuelne Privatne Mreže 1 Dr Milan Marković. VPN implementations  In the following sections we will discuss these popular VPN implementation methods,
T. Kranz TOA Germany N-8000 SERIES IP BASED INTERCOM SYSTEM Network Requirement.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
Computer Network Architecture Lecture 7: OSI Model Layers Examples II 1 26/12/2012.
Andre’s VLAN Andre’s VLAN Nykoya’s VLAN Nykoya’s VLAN Patrick’s VLAN Patrick’s VLAN.
MPLS Virtual Private Networks (VPNs)
Virtual Private Networks
IPSec Detailed Description and VPN
Virtual Private Networks
Virtual Private Network (VPN)
A quick intro to networking
CSE 4905 IPsec.
How data travels through a network The Internet
Virtual LANs.
Chapter 4 Core TCP/IP Protocols
Virtual Private Network (VPN)
The Business Value of MPLS VPNs
תרגול 11 – אבטחה ברמת ה-IP – IPsec
Security Protocols in the Internet
Firewalls Routers, Switches, Hubs VPNs
Networking Essentials For Firewall-1 Administrators
Chapter 8 – Data switching and routing
Presentation transcript:

Understanding “Virtual” Networks J.J. Ekstrom Fall 2011

Understanding VLANs, Tunnels and VPNs Dest MAC0x8100Source Mac Payload Ether CRCDest MAC Old Ether type Source Mac Ethernet II packet packet Len < 1500 Payload Ether CRCDest MAC Ether type > 1500 Source Mac Pad 802.1p/Q packet Ether CRC VLAN Tag 4bits priority 12 bits VLAN # Payload Pad Link to: IANA EtherType List VLAN Tag VLANs separate Traffic, but access to wire gives access to data.

VPN not Necessarily Secure Payload Ether CRC Dest MACIPSource Mac LTTP packet (Layer 2 Tunneling Protocol) IP Header/ UDP Payload Ether CRCDest MAC Ether type > 1500 Source Mac Pad Payload Ether CRC Dest MACIPSource Mac LTTP packet (Layer 2 Tunneling Protocol) IP Header/ UDP Payload Ether CRCDest MAC Ether type > 1500 Source Mac Pad However payload can be encrypted which reveals pipe but not the contents

MPLS: VLANS on the WAN Ethernet II packet Payload Ether CRCDest MAC Ether type > 1500 Source Mac Pad MPLS Label Edge Router Label Switch Router Label Switch Router Label Switch Router Label Switch Router Label Switch Router Label Switch Router Label Switch Router Label Switch Router Puts on Label Takes off Label and decrypts if necessary Just uses Label Can encrypt for security

MPLS Mappings VLAN tag to MPLS Label IP subnet to MPLS Label IP Destination subnet to MPLS Label Can be different depending on content. ◦ Encrypt some packets not others.

Tunneling (SSL) Treating a stream like a wire. SSL (Secure Sockets Layer) ◦ OpenSSL has tunneling built in. ◦ In on local port tunneled to destination IP and port. ◦ Travels through a virtual wire on port 80 ◦ Looks like http traffic

Virtual Private Networks Typically Encrypted Encapsulate a packet in another protocol’s payload.

Generalizations VPN, VLANs, MPLS, L2TP are all variations on a theme of “tunnel” Tunnels can be used for various things: ◦ Routing simplification ◦ Encryption ◦ Traffic management ◦ …