Xposé de 4 Éme Année: VPN Technology
Xposé de 4 Éme Année: VPN Technology
Xposé de 4 Éme Année: VPN Technology
Thème
VPN Technology
Promotion : IGE 41
Année Universitaire : 2019-2020
Contents
1 Introduction 1
4 VPN Protocols 9
4.1 PPTP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
4.1.1 How PPTP Works . . . . . . . . . . . . . . . . . . . . . . 9
4.2 L2TP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
4.3 SSL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
4.3.1 How SSL works . . . . . . . . . . . . . . . . . . . . . . . 10
4.4 IPsec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
4.4.1 What is IPsec . . . . . . . . . . . . . . . . . . . . . . . . . 11
4.4.2 How IPsec Works . . . . . . . . . . . . . . . . . . . . . . . 12
6 Conclusion 17
Bibliography 17
i
Acronyms
IP Internet Protocol. 11
ii
Acronyms
Page iii
List of Figures
1
2. Fundamentals of VPN Technology
2
2.3. Advantages of VPN
• Unblock websites bypass filters. VPNs are great for accessing blocked
websites or for bypassing Internet filters. This is why there is an increased
number of VPN services used in countries where Internet censorship is
applied.
Page 3
2.3. Advantages of VPN
Page 4
3. Encryption and hash functions
5
3.2. Types of encryption
Page 6
3.3. Hash Function
Page 7
3.3. Hash Function
Page 8
4. VPN Protocols
4.1 PPTP
PPTP is a protocol that allows PPP connections to be tunneled through an IP
network, creating a VPN. Thus, a remote machine on network X can tunnel
traffic to a gateway machine on network Y and appear to be sitting, with an
internal IP address, on network Y. The gateway machine receives traffic to this
internal IP address, and sends it back to the remote machine on network X.
There are two primary ways of using PPTP, either directly over the Internet or
through dial up services.
9
4.2. L2TP
does not specify specific algorithms for authentication and encryption; instead
it provides a framework for negotiating particular algorithms. This negotiation
is not specific to PPTP, and relies upon existing PPP option negotiations con-
tained within CCP, CHAP, and other PPP extensions and enhancements. Just
as PPP sessions have been able to netogiate compression algorithms, they can
negotiate authentication or encryption algorithms[4].
4.2 L2TP
L2TP extends the PPP model by allowing the L2 and PPP endpoints to reside
on different devices interconnected by a packet-switched network. With L2TP,
a user has an L2 connection to an access concentrator (e.g., modem bank, ADSL
,DSLAM, etc.), and the concentrator then tunnels individual PPP frames to the
NAS. This allows the actual processing of PPP packets to be divorced from the
termination of the L2 circuit.
One obvious benefit of such a separation is that instead of requiring the
L2 connection terminate at the NAS (which may require a long-distance toll
charge), the connection may terminate at a (local) circuit concentrator, which
then extends the logical PPP session over a shared infrastructure such as frame
relay circuit or the Internet. From the user’s perspective, there is no functional
difference between having the L2 circuit terminate in a NAS directly or using
L2TP. L2TP may also solve the multilink hunt-group splitting problem. Multi-
link PPP [RFC1990] requires that all channels composing a multilink bundle be
grouped at a single Network Access Server (NAS). Due to its ability to project
a PPP session to a location other than the point at which it was physically
received, L2TP can be used to make all channels terminate at a single NAS.
This allows multilink operation even when the calls are spread across distinct
physical NASs [5].
4.3 SSL
SSL provides privacy and reliability between two communicating applications.
The protocol is composed of two layers. At the lowest level, layered on top
of some reliable transport protocol (e.g., TCP [RFC0793]), is the SSL record
protocol. The SSL record protocol is used for encapsulation of various higher
level protocols. One such encapsulated protocol, the SSL handshake protocol,
allows the server and client to authenticate each other and to negotiate an
encryption algorithm and cryptographic keys before the application protocol
transmits or receives its first byte of data. One advantage of SSL is that it is
application protocol independent. A higher level protocol can layer on top of
the SSL protocol transparently.
Page 10
4.4. IPsec
vpn.png vpn.png
4.4 IPsec
4.4.1 What is IPsec
IPsec is a suite of protocols used to protect IP packets and has been around for
decades. It is in use today for both remote-access VPNs and site-to-site VPNs.
IPsec provides security services at the IP layer by enabling a system to
select required security protocols, determine the algorithm(s) to use for the
service(s), and put in place any cryptographic keys required to provide the
requested services. IPsec can be used to protect one or more ”paths” between
a pair of hosts, between a pair of security gateways, or between a security
gateway and a host. (The term ”security gateway” is used throughout the IPsec
documents to refer to an intermediate system that implements IPsec protocols.
For example, a router or a firewall implementing IPsec is a security gateway.)
The set of security services that IPsec can provide includes access control,
connectionless integrity, data origin authentication, rejection of replayed packets
(a form of partial sequence integrity), confidentiality (encryption), and limited
traffic flow confidentiality. Because these services are provided at the IP layer,
Page 11
4.4. IPsec
they can be used by any higher layer protocol, e.g., TCP, UDP,ICMP,BGP,
etc.
The IPsec DOI also supports negotiation of IP compression [SMPT98], mo-
tivated in part by the observation that when encryption is employed within
IPsec, it prevents effective compression by lower protocol layers.
other to provide a desired set of security services in IPv4 and IPv6. Each
protocol supports two modes of use: transport mode and tunnel mode. In trans-
port mode the protocols provide protection primarily for upper layer protocols;
in tunnel mode, the protocols are applied to tunneled IP packets.
IPsec allows the user (or system administrator) to control the granularity
at which a security service is offered. For example, one can create a single
encrypted tunnel to carry all the traffic between two security gateways or a
separate encrypted tunnel can be created for each TCP connection between
each pair of hosts communicating across these gateways. IPsec management
must incorporate facilities for specifying:
• Which security services to use and in what combinations.
Page 12
5. Site-To-Site VPN lab
13
5.1. Configuration
5.1 Configuration
ISP router configuration
hostname ISP
i n t e r f a c e g0 /1
ip address 209.165.200.2 255.255.255.0
no s h u t
i n t e r f a c e g0 /0
ip address 209.165.100.2 255.255.255.0
no s h u t
exit
Configure IPsec on the router 1
hostname R1
i n t e r f a c e g0 /1
ip address 192.168.1.1 255.255.255.0
no s h u t
i n t e r f a c e g0 /0
ip address 209.165.100.1 255.255.255.0
no s h u t
exit
ip route 0 . 0 . 0 . 0 0 . 0 . 0 . 0 209.165.100.2
!
c r y p t o isakmp p o l i c y 10
e n c r y p t i o n a e s 256
a u t h e n t i c a t i o n pre−s h a r e
group 5
!
c r y p t o isakmp key s e c r e t k e y a d d r e s s 2 0 9 . 1 6 5 . 2 0 0 . 1
!
c r y p t o i p s e c t r a n s f o r m −s e t R1−R3 esp−a e s 256 esp−sha−hmac
!
c r y p t o map IPSEC−MAP 10 i p s e c −isakmp
set peer 209.165.200.1
s e t p f s group5 s e t s e c u r i t y −a s s o c i a t i o n l i f e t i m e s e c o n d s 86400
s e t t r a n s f o r m −s e t R1−R3
match a d d r e s s 100
!
i n t e r f a c e G i g a b i t E t h e r n e t 0 /0 c r y p t o map IPSEC−MAP
!
a c c e s s − l i s t 100 p e r m i t i p 1 9 2 . 1 6 8 . 1 . 0 0 . 0 . 0 . 2 5 5 1 9 2 . 1 6 8 . 3 . 0 0 . 0 . 0 . 2 5 5
Configure IPsec on the router 3
hostname R3
i n t e r f a c e g0 /1
ip address 192.168.3.1 255.255.255.0
no s h u t
i n t e r f a c e g0 /0
ip address 209.165.200.1 255.255.255.0
Page 14
5.2. Verification
no s h u t
exit
ip route 0 . 0 . 0 . 0 0 . 0 . 0 . 0 209.165.200.2
!
c r y p t o isakmp p o l i c y 10
e n c r y p t i o n a e s 256
a u t h e n t i c a t i o n pre−s h a r e
group 5
!
c r y p t o isakmp key s e c r e t k e y a d d r e s s 2 0 9 . 1 6 5 . 1 0 0 . 1
!
c r y p t o i p s e c t r a n s f o r m −s e t R3−R1 esp−a e s 256 esp−sha−hmac
!
c r y p t o map IPSEC−MAP 10 i p s e c −isakmp s e t p e e r 2 0 9 . 1 6 5 . 1 0 0 . 1
s e t p f s group5 s e t s e c u r i t y −a s s o c i a t i o n l i f e t i m e s e c o n d s 86400
s e t t r a n s f o r m −s e t R3−R1
match a d d r e s s 100
!
i n t e r f a c e G i g a b i t E t h e r n e t 0 /0
c r y p t o map IPSEC−MAP
!
a c c e s s − l i s t 100 p e r m i t i p 1 9 2 . 1 6 8 . 3 . 0 0 . 0 . 0 . 2 5 5 1 9 2 . 1 6 8 . 1 . 0 0 . 0 . 0 . 2 5 5
5.2 Verification
Verifying connectivity between PC0 and PC1 which are in different LAN, using
the command:
ping 1 9 2 . 1 6 8 . 3 . 1 0
ping 1 9 2 . 1 6 8 . 1 . 1 0
Page 15
5.2. Verification
Page 16
6. Conclusion
17
Bibliography
[1] MICHAEL WATKINS. CCNA Security 640-554, Official Cert Guide. 2012,
p. 426.
[2] url: https://www.ibvpn.com/2010/02/8-advantages-of-using-vpn/.
[3] William Stallings. Cryptography and Network Security. 2005, p. 453.
[4] Bruce Schneier. “Cryptanalysis of Microsoft’s Point-to-Point Tunneling
Protocol (PPTP)”, p. 7. doi: http://www.schneier.com/paper-pptp.
pdf.
[5] W. Townsley. “Layer Two Tunneling Protocol L2TP”. In: (1999), p. 03.
doi: https://tools.ietf.org/html/rfc2661.
[6] A. Freier P. Karlton. “The Secure Sockets Layer (SSL) Protocol Version
3.0”. In: (2011), p. 06. doi: https://tools.ietf.org/html/rfc6101.
[7] Kent Atkinson. “Security Architecture for the Internet Protocol”. In: (1998),
p. 06. doi: https://tools.ietf.org/html/rfc2401.
18