0% found this document useful (0 votes)
76 views

Virtual Lans (Vlan) and Virtual Private Networks (VPN)

This document summarizes a lecture on virtual LANs (VLANs) and virtual private networks (VPNs). It defines VLANs as logically grouping devices on different physical LANs. VLANs can help with traffic congestion and separating user groups. The document discusses different VLAN configuration strategies and how switches use 802.1Q tagging to identify VLAN traffic. It also defines VPNs as using public networks like the Internet to securely connect private networks, and discusses authentication, access control, confidentiality and integrity needs for VPN implementations.

Uploaded by

kass_ecs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views

Virtual Lans (Vlan) and Virtual Private Networks (VPN)

This document summarizes a lecture on virtual LANs (VLANs) and virtual private networks (VPNs). It defines VLANs as logically grouping devices on different physical LANs. VLANs can help with traffic congestion and separating user groups. The document discusses different VLAN configuration strategies and how switches use 802.1Q tagging to identify VLAN traffic. It also defines VPNs as using public networks like the Internet to securely connect private networks, and discusses authentication, access control, confidentiality and integrity needs for VPN implementations.

Uploaded by

kass_ecs
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

Lecture 10:

Virtual LANs (VLAN)


and
Virtual Private Networks (VPN)
Prof. Shervin Shirmohammadi
SITE, University of Ottawa
Prof. Shervin Shirmohammadi

CEG 4185

10-1

Virtual LANs
Description:
Group of devices on one or more physical LANs that are configured as if
they are logically attached to the same wire
LANs based on Logical instead of Physical connections

Used to help alleviate traffic congestion without adding more


bandwidth
Used to separate out users into logical groups of workers,
regardless of actual physical location.
Usage scenarios:
Say you want workers assigned to the same project to be grouped logically
together for control of traffic but they are physically located in different
physical areas
Say you want to divide up the broadcast domain in a large flat network
without using a bunch of routers

Must be supported by the switch: switches must have the ability


to support more than one subnet
Prof. Shervin Shirmohammadi

CEG 4185

10-2

VLAN Types and Strategies


Types:
Port Based - Configured at each switch port
Port X on Switch A belongs to VLAN 1
Port Y on Switch B belongs to VLAN 1

MAC Address Based - Uses the end stations MAC address for VLAN
Assignment
Host X MAC belongs to VLAN 1
Host Y MAC belongs to VLAN 1

Protocol Based - Uses LAN protocol to determine VLAN assignment


Host X uses IP and belongs to VLAN 1
Host Y uses IPX and belongs to VLAN 2

Dynamic Based - A User Profile (stored as a database) determine VLAN


assignment
When Host X logs in, the profile says to connect the user to VLAN 1

Strategies:
At the User Level
At the Wiring Closet Level
AT the Distribution Switch Level
Prof. Shervin Shirmohammadi

CEG 4185

10-4

User Level VLAN


Users belong to a
specific VLAN
regardless of
where they attach
to the network
User can roam
on the network
Beneficial when
traffic stays on the
VLAN
However,
broadcast traffic
will follow the
user
Prof. Shervin Shirmohammadi

ENTERPRISE
SWITCH

ENTERPRISE
SWITCH

ROUTER

ROUTER

DISTRIBUTION
SWITCH

WORKGROUP
SWITCH

DISTRIBUTION
SWITCH

WORKGROUP
SWITCH

WORKGROUP
SWITCH

Host C
VLAN 2

Host A
VLAN 1

WORKGROUP
SWITCH

Host B
VLAN 1

Broadcast Domain for VLAN 1

CEG 4185

10-5

User Movement
If Host A moves to a
different Workgroup
Switch, the Broadcast
Domain follows the
movement of Host A.

ENTERPRISE
SWITCH

ENTERPRISE
SWITCH

ROUTER

ROUTER

DISTRIBUTION
SWITCH

WORKGROUP
SWITCH

DISTRIBUTION
SWITCH

WORKGROUP
SWITCH

WORKGROUP
SWITCH

Host C
VLAN 2

Host A
VLAN 1

WORKGROUP
SWITCH

Host B
VLAN 1

Broadcast Domain for VLAN 1

Prof. Shervin Shirmohammadi

CEG 4185

10-6

Wiring Closet VLAN


Provides a means for
broadcast domain
control
Good when traffic
mostly flows to
enterprise servers
People must be
physically close
together on same
VLAN
Broadcast traffic will
not follow the user

ENTERPRISE
SWITCH

ENTERPRISE
SWITCH

ROUTER

ROUTER

DISTRIBUTION
SWITCH

WORKGROUP
SWITCH

DISTRIBUTION
SWITCH

WORKGROUP
SWITCH

VLAN 1 based
on Workgroup
Switch

WORKGROUP
SWITCH

Host C
VLAN 1

Host A
VLAN 1

WORKGROUP
SWITCH

Host B
VLAN 1

Broadcast Domain for VLAN 1

Prof. Shervin Shirmohammadi

CEG 4185

10-7

User Movement
If Host A moves
to a different
Workgroup
Switch, it belongs
to a new VLAN.
Broadcast
Domain stays
with the switch,
and does not
follow Host A.

ENTERPRISE
SWITCH

ENTERPRISE
SWITCH

ROUTER

ROUTER

DISTRIBUTION
SWITCH

WORKGROUP
SWITCH

DISTRIBUTION
SWITCH

WORKGROUP
SWITCH

WORKGROUP
SWITCH

WORKGROUP
SWITCH

Host C
VLAN 1

Host B
VLAN 1

Host A
VLAN 2

Broadcast Domain for VLAN 1

Prof. Shervin Shirmohammadi

CEG 4185

10-8

Distribution Switch VLAN


Middle ground
between User and
Wiring Closet
designs
For traffic that goes
to both enterprise and
distributed services
If users move but
stay on the same
distribution switch Same VLAN
If users move to
different distribution
switch, then its a
Different VLAN
Prof. Shervin Shirmohammadi

ENTERPRISE
SWITCH

ENTERPRISE
SWITCH

ROUTER

ROUTER

VLAN 1 based on
Distribution Switch

DISTRIBUTION
SWITCH

WORKGROUP
SWITCH

WORKGROUP
SWITCH

DISTRIBUTION
SWITCH

WORKGROUP
SWITCH

Host C
VLAN 1

Host A
VLAN 1

WORKGROUP
SWITCH

Host B
VLAN 1

Broadcast Domain for VLAN 1

CEG 4185

10-9

User Movement
If Host A moves to a
different Distribution
Switch, the
Broadcast Domain
follows Host A since
it stays on the same
distribution switch.

ENTERPRISE
SWITCH

ENTERPRISE
SWITCH

ROUTER

ROUTER

DISTRIBUTION
SWITCH

WORKGROUP
SWITCH

DISTRIBUTION
SWITCH

WORKGROUP
SWITCH

WORKGROUP
SWITCH

Host C
VLAN 1

WORKGROUP
SWITCH

Host B
VLAN 1

Host A
VLAN 1

Broadcast Domain for VLAN 1

Prof. Shervin Shirmohammadi

CEG 4185

10-10

How Does the Network Know?


How does the network know where to send the data when a
VLAN has been put into place?
Initially, IEEE 802.10, Interoperable LAN/MAN Security (SILS)
standard released in 1992, puts the VLAN information between the MAC
and LAN address space. Today, using IEEE 802.1Q, Frames can be
tagged with the VLAN information.

How do we interconnect these smart switches?


We could try to manually connect them together.
This is not recommended. One can easily make a mistake when physically
interconnecting the appropriate ports for the VLAN.
Switch

VLAN1

Prof. Shervin Shirmohammadi

Switch

VLAN2

VLAN2

CEG 4185

VLAN1

10-11

VLAN Trunking
One simple solution is to trunk the lines together:
On each switch we configure a trunk port (can be any Ethernet port) that is
logically connected to multiple VLANs.
Then we connect the trunk ports together.
The numbering is kept consistent through the use of 802.1Q tags.

When one switch sends an Ethernet frame to the other, the


transmitting switch inserts the 802.1Q tag with the appropriate VID.
The receiving switch reads the VID and forwards the Ethernet frame
to the appropriate VLAN.
Switch

Switch

VLAN1

VLAN1

VLAN2

VLAN2
.
.
.

.
.
.

Prof. Shervin Shirmohammadi

CEG 4185

10-12

802.1Q Tag

The priority bits are the reason why 802.1Q is often referred to as 802.1
P/Q
The VID bits make trunking possible.
Ethernet switches and endpoints must be capable of interpreting the
802.1Q tag to make use of the tag.

Prof. Shervin Shirmohammadi

CEG 4185

10-13

802.1Q Terminology
access port / link - defines a port with one or more untagged
VLANs, and a link connecting two such ports.
trunk port / link - defines a port with multiple VLANs that
are all tagged, and a link connecting two such ports.
hybrid port / link - defines a port with both untagged and
tagged VLANs, and a link connecting two such ports.
VID - VLAN ID
PVID - Port VLAN ID
tagged frame - An Ethernet (IEEE 802.3) frame with the
802.1Q tag.
clear frame - An Ethernet frame with no tag.
VLAN trunking - a generic networking term to describe the
process of forwarding multiple VLANs across a single link,
whether via 802.1Q or proprietary protocols like Ciscos
InterSwitch Link Protocol (ISL).
Prof. Shervin Shirmohammadi

CEG 4185

10-14

VLAN Configuration
The VLANs must be configured independently on
each switch, using any of the following methods:
manually via the command line interface (CLI) or web
interface.
with a VLAN management tool provided by the vendor.
automatically with a standard protocol like GVRP (GARP
VLAN Registration Protocol), which works in conjunction
with 802.1Q.
automatically with a proprietary protocol like Ciscos VTP
(Virtual Trunking Protocol), which works in conjunction
with Ciscos proprietary ISL (Inter-Switch Link) trunking
protocol.
Prof. Shervin Shirmohammadi

CEG 4185

10-15

A VLAN Scenario

The access switches have multiple VLANs, and the uplinks to the distribution
switch are hybrid or trunk links.

VLAN1 is the management VLAN in this setup.


The access switches are hosts on VLAN1.
Management stations, such as an SNMP server, are connected to VLAN1.
VLANs 2- 5 are user VLANs for devices such as user PCs.

VLAN5

VLAN4

VLAN3

VLAN2

VLAN1

Router

Trunk VLAN 1,4,5


Switch 10.1.1.253

Trunk VLAN 1,2,3

Switch 10.1.1.252

VLAN1

VLAN2

Prof. Shervin Shirmohammadi

Switch 10.1.2.252

VLAN3

VLAN1

VLAN4

VLAN5

CEG 4185

10-16

Virtual Private Networks


VPNs enable an organization to use Public Networks such as
the Internet, to provide a Secure connection among the
organizations wide area network.
Customers can use VPNs to connect an enterprise Intranet to
a wide area network comprised of partners, customers,
resellers and suppliers
Traditionally, businesses have relied on private 56-Kbps or T1 leased lines to connect remote offices together
Leased lines are expensive to install and maintain
For small companies, the cost is just too high

Using the Internet as a backbone, a VPN can securely and


cost effectively connect all of a companies offices,
telecommuters, mobile workers, customers, partners and
suppliers.
Prof. Shervin Shirmohammadi

CEG 4185

10-17

VPN Functionality
A VPN needs to provide the following 4 critical functions:
Authentication ensuring that the data originates at the source that it
claims.
Access Control restricting unauthorized users form the network.
Confidentiality Preventing anyone from reading the data as it travels
through the network
Data Integrity Preventing anyone from tampering with the data as it
traverses through the network

Various approaches exist that offer authentication and access


control for a VPN:

Challenge Handshake Authentication Protocol (CHAP)


Remote Authentication Dial-In Users (RADIUS)
Hardware-based tokens
Digital certificates

Prof. Shervin Shirmohammadi

CEG 4185

10-18

VPN Implementation Types


Three Primary Forms:
A special purpose device consisting of a network interface,
operating system and hardware based cryptographic support
A software solution that works with the OSI layers to provide
encryption
A hybrid in which the VPN application runs on standard
computing platforms that may use an outboard cryptographic
processor

Prof. Shervin Shirmohammadi

CEG 4185

10-19

VPN Gateway and Tunnels


A VPN gateway is a network device that provides encryption and
authentication service to a multitude of hosts that connect to it.
From the outside (Internet), all communications addressed to
inside hosts flow through the gateway
There are 2 types of end point VPN tunnels:
Computer to Gateway
For remote access:
generally set up for a
remote user to connect
A corporate LAN.

Gateway to Gateway
This the typical
Enterprise-to-enterprise
configuration. The 2 gateways
communicate with each other.
Prof. Shervin Shirmohammadi

CEG 4185

10-20

VPN Protocols
Four protocols have been suggested for creating VPNs.

Point to Point Tunneling Protocol (PPTP)


Layer 2 Forwarding (L2F)
Layer 2 Tunneling Protocol (L2TP)
IP Security Protocol (IPSec)

The reason for so many choices is that for some


corporations VPNs are used as their remote access
security mechanism for others it is a secure tunnel
between LANs.
PPTP, L2F, and L2TP are used primarily for remote
access, while IPSec is used for LAN to LAN tunneling.

Prof. Shervin Shirmohammadi

CEG 4185

10-21

10

Point to Point Tunneling Protocol (PPTP)

PPTP originated from Microsofts secure remote access to capability with


Windows NT.
It is derivative of PPP (the popular dial-in point to point protocol).
PPTP encapsulates PPP packets over a modified version of the Generic
Routing Encapsulation (GRE) protocol
GRE is a protocol for facilitating the encapsulation of one protocol into another
(RFC 1701 & 1702).

PPTP relies on the PPP authentication procedure, password authentication


and Challenge Handshake Authentication Protocol (CHAP).
It does not support strong encryption and token-based authentication.
LAN A
Private
10.2.1.0

Internet

Router A
194.20.12.1

Prof. Shervin Shirmohammadi

LAN B
Private
10.3.1.0

Router B
194.20.12.2

CEG 4185

10-22

Layer 2 Forwarding (L2F)


L2F is similar to PPTP and was developed around the same
time period. It is also a remote access VPN technology.
It is a layer 2 VPN implementation and can support other
media like Frame relay and ATM.
It is also based on PPP authentication but can also support
Terminal Access Controller Access Control System
(TACACS) and RADIUS for authentication.
It supports multiple connections in one VPN tunnel through a
connection ID tag.
It supports 2 levels of authentication: one at the ISP level and
another at the enterprise level.

Prof. Shervin Shirmohammadi

CEG 4185

10-23

11

Layer 2 Tunneling Protocol (L2TP)


L2TP is an IETF standard (RFC 2661, 1999)
designed as the next generation VPN protocol to
replace PPTP & L2F.
Also uses PPP through the Internet but defines its
own tunneling protocol based on the work done by
L2F.
It uses IPSecs encryption algorithms.

It includes the Password Authentication Protocol


(PAP), CHAP authentication protocol, as well as
RADIUS.
Prof. Shervin Shirmohammadi

CEG 4185

10-24

IPsec
A protocol used to enhance IP with security.
Establishes a simplex connection, known as
Security Association (SA).
Unlike normal IP, that is connectionless.
Its a simplex connection, so wed need two SAs for a
full-duplex secure connection.

Provides Authentication Header (AH), and


Encapsulating Security Payload (ESP).
AH is used for authentication, ESP is used for :
authentication and confidentiality.
Used in transport mode (host-to-host), or tunnel
mode (gateway-to-gateway).
Prof. Shervin Shirmohammadi

CEG 4185

10-25

12

IPsec AH
The IPsec authentication header in transport mode for
IPv4.

HMAC: Hashed Message


Authentication Code
Packet, and some IP header
fields, are hashed together
with a private key to form a
digital signature.

How to let the receiver know that this packet is an


IPsec packet?
Set the protocol field in the IP header to be IPsec (value 51)
Prof. Shervin Shirmohammadi

CEG 4185

10-26

AH fields

Next Header: the actual protocol field in the IP header that


was replaced with 51.
Payload Length: length of AH (in counts of 32-bits)
Security parameters index: connection identifier, indicates the
connection that this packet belongs to.
Each connection has its own key. Therefore the receiver knows, from
this identifier, which key to use.

Sequence number: used not for ordering (like TCP) but to


prevent replay attacks!
Wrap-around is not allowed.
Prof. Shervin Shirmohammadi

CEG 4185

10-27

13

IPsec ESP
Used for both authentication and confidentiality.
ESP header has fields similar to the AH header, plus
some more for encryption purposes.
HMAC is a trailer (rather than a header) due to easier
hardware implementation (like Ethernets CRC).

(a) ESP in transport mode.


(Host to host)
Prof. Shervin Shirmohammadi

(b) ESP in tunnel mode.


(gateway to gateway)
CEG 4185

10-28

VPN Components
There are four components to a VPN network.
The Internet
Fundamental plumbing for the network

Security Gateways
Sit between public and private networks preventing unauthorized intrusion
(Firewalls, routers, integrated VPN hardware and software.)
May provide tunneling and encrypt private data.

Security Policy Servers


Maintains Access control lists that the security gateway uses to determine which
traffic is authorized. For example some systems use a RADIUS server for these
policies.

Certificate Authorities
These are used to confirm the authenticity of shared keys among sites. Companies
might choose to maintain their own digital certificate server or might use an external
agency of creating an extranet.

Part of the challenge we face as network designers is to decide how


much of this functionality should be integrated into one or more
devices (firewalls, special purpose hardware, etc.).
Prof. Shervin Shirmohammadi

CEG 4185

10-29

14

Network Placement
General Placement Rules
VPN Gateway must not be single point of failure
VPN Gateway must only accept encrypted traffic
VPN Gateway must accept encrypted and unencrypted traffic from the trusted
network
VPN Gateway must defend itself from Internet threats

Relation to the Firewall


In front of firewall
Single connection, that accepts encrypted and unencrypted traffic, you might not
know if gateway was compromised from the Internet

Behind the firewall


Firewall will protect gateway, but opening must be made in the firewall for the
gateway to function

On the firewall
A technological challenge (why?), starting to see more of this

VPN gateway on the firewall side (Currently the best solution)


Firewall outside connects to both the Gateway and the Internet
Gateway connects to the Internet, but only accepts encrypted traffic. Once gateway
decrypts, information is filtered by firewall. All unencrypted traffic goes to the
firewall.
Prof. Shervin Shirmohammadi

CEG 4185

10-30

Network Placement Details

The Gateway will only accept


encrypted Traffic, after
decryption, traffic flows
through the firewall
Prof. Shervin Shirmohammadi

CEG 4185

10-31

15

Performance
Cryptographic processing is computationally intensive
Specially public key encryption used in authentication
Also, continuous encryption/decryption (e.g., secure video conferencing)
requires constant high performance.

General purpose computers typically do not have the proper I/O


capability to perform the processing required at high performance
Thus, we have Black Boxes to provide the performance we need.
Typically dedicated hardware

If QoS is important (e.g., Differentiated Services), you should


separate your QoS requirements from your VPN requirements.
Packets must be classified before the VPN encryption and the
encrypted packets need to be marked for priority using IP Type of
Service (ToS)
Prof. Shervin Shirmohammadi

CEG 4185

10-32

16

You might also like