ComssDesign

Compare, design and deploy VPNs--A tutorial--Part II

Mark Lewis
Jul 21, 2006 (10:09 AM)
URL: http://www.commsdesign.com/showArticle.jhtml?articleID=191000198

Part I is a practical guide for using IPsec, MPLS Layer 3, L2TPv3, L2TPv2, AToM and SSL VPNs, so start here and then enjoy this segment.

Service Provider Provisioned Site-to-Site VPNs
Service provider provisioned site-to-site VPNs (PPVPN) fall into one of three categories: Layer 1 VPNs, Layer 2 VPNs, and Layer 3 VPNs. Layer 2 and Layer 3 site-to-site VPN types are described in the sections that follow.

NOTE Layer 1 VPNs are used to transport Layer 1 services over an intervening shared network controlled and managed by Generalized Multiprotocol Label Switching (GMPLS).

Layer 2 VPNs
Layer 2 site-to-site VPNs (L2VPN) can be provisioned between switches, hosts, and routers and allow data link layer connectivity between separate sites. Communication between customer switches, hosts, and routers is based on Layer 2 addressing, and PE devices perform forwarding of customer data traffic based on incoming link and Layer 2 header information (such as MAC address, Frame Relay Data Link Connection Identifier (DLCI, and so on).

There are two categories of provider provisioned L2VPN:

Layer 3 VPNs
Layer 3 site-to-site VPNs (L3VPN) interconnect hosts and routers at separate customer sites. These customer hosts and routers communicate based on Layer 3 (network layer) addressing, and PE devices forward customer traffic based on incoming link, and on addresses contained in the (outer) IP header.

There are two overall types of L3VPN:

PE-based L3VPNs can be further classified as follows:

Figure 7 illustrates a typical CE-based site-to-site VPN.


Figure 7. Typical CE-Based Site-to-Site VPN

Customer Provisioned Site-to-Site VPNs
Customer provisioned site-to-site VPNs are configured on CE devices such as routers and firewalls. In this case, tunnels are configured between CE devices in the VPN, and customer data traffic is sent over these tunnels. Protocols used to encapsulate user data traffic as it is sent over the tunnels between VPN sites include GRE and IPsec.

Service Provider and Customer Provisioned Remote Access VPNs
Remote access VPNs can be configured in either compulsory tunnel mode or voluntary tunnel mode. These two modes of operation are described as follows:

One type of remote access VPN is a Virtual Private Dialup Network (VPDN). This term can be used to describe remote access VPNs (L2F, PPTP, and L2TP) in which remote users connect over a PSTN or Integrated Services Digital Network (ISDN) to a dial NAS. User data traffic is then tunneled to a VPN gateway. With so many remote users now connecting over cable, Digital Subscriber Line (DSL), and other high-speed connections, rather than via dial connections, this term is slightly outdated.

Other Methods of Categorizing VPNs
Yes, there are yet more methods of categorizing VPNs! VPNs can be further categorized depending on whether they are connection oriented or connectionless, whether they are overlay or peer to peer, and whether they are secure or trusted.

Overlay and Peer-to-Peer VPNs
A VPN can be categorized as either an overlay or peer VPN depending on whether PE devices are aware of customer network addressing, and route customer traffic based on customer network address space.

Overlay and peer VPNs are summarized as follows:

Connection-Oriented and Connectionless VPNs
VPNs can be either connection oriented or connectionless depending on whether VCs or tunnels are provisioned to carry VPN traffic.

Connection-oriented and connectionless VPNs are described as follows:

  • Connection-oriented VPNs--In connection-oriented VPNs, VCs or tunnels are set up to carry VPN traffic.

    Examples of connection-oriented VPNs are those provisioned using Frame Relay or ATM VCs, as well as those provisioned using L2TP or IPsec tunnels.

  • Connectionless VPNs--In connectionless VPNs, neither VCs nor tunnels are set up to carry VPN traffic.

    PE-based VPNs that rely on the partitioning of customer data traffic by using ACLs configured on PE devices are connectionless VPNs.

    Trusted and Secure VPNs
    VPNs can be described as being either trusted or secure. Whether a VPN is trusted or secure depends on whether customer data traffic is authenticated and encrypted as it passes between VPN peers (sites in an site-to-site VPN, or a remote access client and a VPN gateway/concentrator in a remote access VPN).

    Trusted and secure VPNs are described as follows:

    And Finally. . .
    And finally, here are two or three sundry VPN classifications:

  • Transport/Application Layer VPNs--SSL sits on top of TCP in the protocol stack, and SSL VPNs are therefore sometimes referred to as either Transport or Application Layer VPNs.
  • Internet VPNs--Designed to run over the public Internet.
  • Multiservice VPNs--Provide a framework for converged services, including voice, video, and data.
  • Deploying Site-to-Site and Remote Access VPNs: A Comparison
    So now you know the VPN protocols and technologies, and how they are categorized, but how do they compare? Included in this section are comparisons of site-to-site as well as remote access VPN technologies.

    Before comparing the various VPN technologies, however, it is worth noting that these VPN technologies are often complementary. For example, although it might seem that BGP/MPLS (RFC4364/2547bis) VPNs and IPsec VPNs are competing provider provisioned site-to-site VPN technologies, IPsec tunnels can, in fact, be used to tunnel VPN traffic between PE routers in an BGP/MPLS (RFC4364/2547bis) VPN backbone. IPsec and L2TP can additionally be used to provide off-net (remote access) for mobile or home-based users to a BGP/MPLS (RFC4364/2547bis) VPN.

    Similarly, although it appears GRE and IPsec are competing customer provisioned site-to-site VPN technologies, in fact, hybrid GRE/IPsec VPNs are commonly deployed. Hybrid GRE/IPsec VPNs are often deployed because GRE has little or no inherent security, whereas IPsec can provide strong security. On the other hand, IPsec cannot transport multiprotocol, whereas GRE can. So, by deploying a GRE over IPsec site-to-site VPN, you combine multiprotocol with strong security—the best of both worlds!

    Site-to-Site VPN Deployment
    Figure 3 shows a number options for provider provisioned, as well as customer provisioned, site-to-site VPNs.

    Provider provisioned site-to-site VPNs can be either L2VPNs or L3VPNs, as follows:

    -IPsec
    -GRE
    -IP-in-IP

    When comparing both provider and customer provisioned site-to-site VPNs, it is important to consider a number of factors. Some of the most important technical considerations for service providers and customers when deploying site-to-site VPNs are as follows:

    Remote Access VPN Deployment
    When deploying remote access VPNs, it is also important to have an understanding of how the various technologies compare. For this reason, a technical comparison of the various remote access VPN technologies is included in this section.

    Compulsory tunnel mode/NAS-initiated remote access VPNs can be deployed using the following protocols:

    Voluntary/client-initiated remote access VPNs can be deployed using the following protocols:

    Some of the most important technical considerations for service providers and customers when deploying remote access VPNs are as follows:

    About the Author
    Mark Lewis is the technial director of MJL Network Solutions, a provider of internetworking solutions that focuses on helping enterprise and service provider customers to implement leading-edge technologies. Mark specializes in next-generation network technologies and has extensive experience in designing, deploying, and migrating large-scale IP/MPLS networks.

    To contact the author, please email: reviews@ciscopress.com and use Comparing, Designing, and Deploying VPNs/post question as the subject line.

    Title: Comparing, Designing, and Deploying VPNs.ISBN: 1-58705-179-6 Author: Mark Lewis. Chapter 1: What is a Virtual Private Network.Published by Cisco Press Reproduced from the book Comparing, Designing, and Deploying VPNs. Copyright [2006], Cisco Systems, Inc. Reproduced by permission of Pearson Education, Inc., 800 East 96th Street, Indianapolis, IN 46240. Written permission from Pearson Education, Inc. is required for all other uses.

    *Visit Cisco Press for a detailed description and to learn how to purchase this title.

    Come back soon for other recently published book excerpts.

    Copyright © 2003 CMP Media, LLC | Privacy Statement