Virtual Lans (Vlan) and Virtual Private Networks (VPN)
Virtual Lans (Vlan) and Virtual Private Networks (VPN)
CEG 4185
10-1
Virtual LANs
Description:
Group of devices on one or more physical LANs that are configured as if
they are logically attached to the same wire
LANs based on Logical instead of Physical connections
CEG 4185
10-2
MAC Address Based - Uses the end stations MAC address for VLAN
Assignment
Host X MAC belongs to VLAN 1
Host Y MAC belongs to VLAN 1
Strategies:
At the User Level
At the Wiring Closet Level
AT the Distribution Switch Level
Prof. Shervin Shirmohammadi
CEG 4185
10-4
ENTERPRISE
SWITCH
ENTERPRISE
SWITCH
ROUTER
ROUTER
DISTRIBUTION
SWITCH
WORKGROUP
SWITCH
DISTRIBUTION
SWITCH
WORKGROUP
SWITCH
WORKGROUP
SWITCH
Host C
VLAN 2
Host A
VLAN 1
WORKGROUP
SWITCH
Host B
VLAN 1
CEG 4185
10-5
User Movement
If Host A moves to a
different Workgroup
Switch, the Broadcast
Domain follows the
movement of Host A.
ENTERPRISE
SWITCH
ENTERPRISE
SWITCH
ROUTER
ROUTER
DISTRIBUTION
SWITCH
WORKGROUP
SWITCH
DISTRIBUTION
SWITCH
WORKGROUP
SWITCH
WORKGROUP
SWITCH
Host C
VLAN 2
Host A
VLAN 1
WORKGROUP
SWITCH
Host B
VLAN 1
CEG 4185
10-6
ENTERPRISE
SWITCH
ENTERPRISE
SWITCH
ROUTER
ROUTER
DISTRIBUTION
SWITCH
WORKGROUP
SWITCH
DISTRIBUTION
SWITCH
WORKGROUP
SWITCH
VLAN 1 based
on Workgroup
Switch
WORKGROUP
SWITCH
Host C
VLAN 1
Host A
VLAN 1
WORKGROUP
SWITCH
Host B
VLAN 1
CEG 4185
10-7
User Movement
If Host A moves
to a different
Workgroup
Switch, it belongs
to a new VLAN.
Broadcast
Domain stays
with the switch,
and does not
follow Host A.
ENTERPRISE
SWITCH
ENTERPRISE
SWITCH
ROUTER
ROUTER
DISTRIBUTION
SWITCH
WORKGROUP
SWITCH
DISTRIBUTION
SWITCH
WORKGROUP
SWITCH
WORKGROUP
SWITCH
WORKGROUP
SWITCH
Host C
VLAN 1
Host B
VLAN 1
Host A
VLAN 2
CEG 4185
10-8
ENTERPRISE
SWITCH
ENTERPRISE
SWITCH
ROUTER
ROUTER
VLAN 1 based on
Distribution Switch
DISTRIBUTION
SWITCH
WORKGROUP
SWITCH
WORKGROUP
SWITCH
DISTRIBUTION
SWITCH
WORKGROUP
SWITCH
Host C
VLAN 1
Host A
VLAN 1
WORKGROUP
SWITCH
Host B
VLAN 1
CEG 4185
10-9
User Movement
If Host A moves to a
different Distribution
Switch, the
Broadcast Domain
follows Host A since
it stays on the same
distribution switch.
ENTERPRISE
SWITCH
ENTERPRISE
SWITCH
ROUTER
ROUTER
DISTRIBUTION
SWITCH
WORKGROUP
SWITCH
DISTRIBUTION
SWITCH
WORKGROUP
SWITCH
WORKGROUP
SWITCH
Host C
VLAN 1
WORKGROUP
SWITCH
Host B
VLAN 1
Host A
VLAN 1
CEG 4185
10-10
VLAN1
Switch
VLAN2
VLAN2
CEG 4185
VLAN1
10-11
VLAN Trunking
One simple solution is to trunk the lines together:
On each switch we configure a trunk port (can be any Ethernet port) that is
logically connected to multiple VLANs.
Then we connect the trunk ports together.
The numbering is kept consistent through the use of 802.1Q tags.
Switch
VLAN1
VLAN1
VLAN2
VLAN2
.
.
.
.
.
.
CEG 4185
10-12
802.1Q Tag
The priority bits are the reason why 802.1Q is often referred to as 802.1
P/Q
The VID bits make trunking possible.
Ethernet switches and endpoints must be capable of interpreting the
802.1Q tag to make use of the tag.
CEG 4185
10-13
802.1Q Terminology
access port / link - defines a port with one or more untagged
VLANs, and a link connecting two such ports.
trunk port / link - defines a port with multiple VLANs that
are all tagged, and a link connecting two such ports.
hybrid port / link - defines a port with both untagged and
tagged VLANs, and a link connecting two such ports.
VID - VLAN ID
PVID - Port VLAN ID
tagged frame - An Ethernet (IEEE 802.3) frame with the
802.1Q tag.
clear frame - An Ethernet frame with no tag.
VLAN trunking - a generic networking term to describe the
process of forwarding multiple VLANs across a single link,
whether via 802.1Q or proprietary protocols like Ciscos
InterSwitch Link Protocol (ISL).
Prof. Shervin Shirmohammadi
CEG 4185
10-14
VLAN Configuration
The VLANs must be configured independently on
each switch, using any of the following methods:
manually via the command line interface (CLI) or web
interface.
with a VLAN management tool provided by the vendor.
automatically with a standard protocol like GVRP (GARP
VLAN Registration Protocol), which works in conjunction
with 802.1Q.
automatically with a proprietary protocol like Ciscos VTP
(Virtual Trunking Protocol), which works in conjunction
with Ciscos proprietary ISL (Inter-Switch Link) trunking
protocol.
Prof. Shervin Shirmohammadi
CEG 4185
10-15
A VLAN Scenario
The access switches have multiple VLANs, and the uplinks to the distribution
switch are hybrid or trunk links.
VLAN5
VLAN4
VLAN3
VLAN2
VLAN1
Router
Switch 10.1.1.252
VLAN1
VLAN2
Switch 10.1.2.252
VLAN3
VLAN1
VLAN4
VLAN5
CEG 4185
10-16
CEG 4185
10-17
VPN Functionality
A VPN needs to provide the following 4 critical functions:
Authentication ensuring that the data originates at the source that it
claims.
Access Control restricting unauthorized users form the network.
Confidentiality Preventing anyone from reading the data as it travels
through the network
Data Integrity Preventing anyone from tampering with the data as it
traverses through the network
CEG 4185
10-18
CEG 4185
10-19
Gateway to Gateway
This the typical
Enterprise-to-enterprise
configuration. The 2 gateways
communicate with each other.
Prof. Shervin Shirmohammadi
CEG 4185
10-20
VPN Protocols
Four protocols have been suggested for creating VPNs.
CEG 4185
10-21
10
Internet
Router A
194.20.12.1
LAN B
Private
10.3.1.0
Router B
194.20.12.2
CEG 4185
10-22
CEG 4185
10-23
11
CEG 4185
10-24
IPsec
A protocol used to enhance IP with security.
Establishes a simplex connection, known as
Security Association (SA).
Unlike normal IP, that is connectionless.
Its a simplex connection, so wed need two SAs for a
full-duplex secure connection.
CEG 4185
10-25
12
IPsec AH
The IPsec authentication header in transport mode for
IPv4.
CEG 4185
10-26
AH fields
CEG 4185
10-27
13
IPsec ESP
Used for both authentication and confidentiality.
ESP header has fields similar to the AH header, plus
some more for encryption purposes.
HMAC is a trailer (rather than a header) due to easier
hardware implementation (like Ethernets CRC).
10-28
VPN Components
There are four components to a VPN network.
The Internet
Fundamental plumbing for the network
Security Gateways
Sit between public and private networks preventing unauthorized intrusion
(Firewalls, routers, integrated VPN hardware and software.)
May provide tunneling and encrypt private data.
Certificate Authorities
These are used to confirm the authenticity of shared keys among sites. Companies
might choose to maintain their own digital certificate server or might use an external
agency of creating an extranet.
CEG 4185
10-29
14
Network Placement
General Placement Rules
VPN Gateway must not be single point of failure
VPN Gateway must only accept encrypted traffic
VPN Gateway must accept encrypted and unencrypted traffic from the trusted
network
VPN Gateway must defend itself from Internet threats
On the firewall
A technological challenge (why?), starting to see more of this
CEG 4185
10-30
CEG 4185
10-31
15
Performance
Cryptographic processing is computationally intensive
Specially public key encryption used in authentication
Also, continuous encryption/decryption (e.g., secure video conferencing)
requires constant high performance.
CEG 4185
10-32
16