SlideShare a Scribd company logo
Hussein Al Osman CEG4190 10-1
Lecture 10:
Virtual LANs (VLAN)
and
Virtual Private Networks (VPN)
Instructor: Hussein Al Osman
Hussein Al Osman CEG4190 10-2
Local Area Networks
• Early days of local area networking: thick yellow cables
snaked through the cable ducts of office buildings
– Every computer they passed was plugged in
• No thought was given to which computer belonged on
which LAN
– People in adjacent offices were put on the same LAN
– Geography trumped corporate organization charts
Hussein Al Osman CEG4190 10-3
Local Area Networks
• With advent of twisted pair and hubs in the 1990s, buildings were
rewired to rip out all the yellow wires and install twisted pairs
from every office to central wiring closets
• If a company wants k LANs, it could buy k switches
• By carefully choosing which connectors to plug into which switches, the
occupants of a LAN can be chosen in a way that makes organizational sense
Hussein Al Osman CEG4190 10-4
Virtual Local Area Networks
• In many companies, organizational changes occur all the
time
– System administrators spend a lot of time pulling out plugs and pushing
them back in somewhere else
• In some cases, the change cannot be made at all because
the twisted pair from the user’s machine is too far from
the correct switch
• Therefore, network vendors began working on a way to
rewire buildings entirely in software
– Resulting concept is called a VLAN (Virtual LAN)
– Standardized by the IEEE 802 committee and is now widely deployed in
many organizations
Hussein Al Osman CEG4190 10-5
Virtual LANs
• Description:
– Group of devices on one or more physical LANs that
are configured as if they are logically attached to the
same wire
– LAN’s based on Logical instead of Physical
connections
• Used to separate out users into logical groups of
workers, regardless of actual physical location.
Hussein Al Osman CEG4190 10-6
Virtual LANs
• Usage scenarios:
– Say you want workers assigned to the same project to
be grouped logically together for control of traffic but
they are physically located in different physical areas
– Say you want to divide up the broadcast domain in a
large flat network without using a bunch of routers
• Must be supported by the switch: switches must
have the ability to support more than one subnet
Hussein Al Osman CEG4190 10-7
Virtual LANs
• To set up a VLAN-based network, the network
designer/administrator decides:
– How many VLANs there will be
– Which computers will be on which VLAN
– What the VLANs will be called
• Often the VLANs are (informally) named by colors
– Since it is then possible to print color diagrams showing the
physical layout of the machines, with the members of the red
LAN in red, members of the green LAN in green, and so on
Hussein Al Osman CEG4190 10-8
VLAN Levels
• At the User Level
• At the Wiring Closet Level
• AT the Distribution Switch Level
Hussein Al Osman CEG4190 10-9
User Level VLAN
• Users belong to a
specific VLAN
regardless of
where they attach
to the network
• User can “roam”
on the network
• Beneficial when
traffic stays on the
VLAN
• However,
broadcast traffic
will follow the
user
Hussein Al Osman CEG4190 10-10
User Movement
If Host A moves to a
different Workgroup
Switch, the Broadcast
Domain follows the
movement of Host A.
Hussein Al Osman CEG4190 10-11
Wiring Closet VLAN
VLAN 1 based
on Workgroup
Switch
• People must be
physically close
together on same
VLAN
• Broadcast traffic will
not follow the user
Hussein Al Osman CEG4190 10-12
User Movement
If Host A moves
to a different
Workgroup
Switch, it belongs
to a new VLAN.
Broadcast
Domain stays
with the switch,
and does not
follow Host A.
Hussein Al Osman CEG4190 10-13
Distribution Switch VLAN
VLAN 1 based on
Distribution Switch
• Middle ground
between User and
Wiring Closet
designs
• If users move but
stay on the same
distribution switch -
Same VLAN
• If users move to
different distribution
switch, then it’s a
Different VLAN
Hussein Al Osman CEG4190 10-14
User Movement
If Host A moves to a
different Distribution
Switch, the
Broadcast Domain
follows Host A since
it stays on the same
distribution switch.
Hussein Al Osman CEG4190 10-15
VLAN Example (1)
• Nine of the machines belong to the G (gray) VLAN and five
belong to the W (white) VLAN
• Machines from the gray VLAN are spread across two
switches, including two machines that connect to a switch via
a hub
S1 S2
Hussein Al Osman CEG4190 10-16
VLAN Example (2)
• To make the VLANs function correctly,
configuration tables have to be set up in the switches
• These tables tell which VLANs are accessible via
which ports
– Note that a port may be labeled with multiple VLAN
colors
• When a frame comes in from the gray VLAN, it
must be forwarded on all the ports marked with a G
for:
– Ordinary (i.e., unicast) traffic where the switch has not
learned the location of the destination
– Broadcast traffic
Hussein Al Osman CEG4190 10-17
VLAN Example (3)
• Suppose that one of the gray stations plugged into S1
sends a frame to a destination that has not been seen
before by S1
– S1 will receive the frame and flood the frame on all ports
labeled G (except the incoming port)
– The frame will be sent to the five other gray stations
attached to S1 as well as over the link from S1 to S2
– At switch S2, the frame is similarly forwarded on all ports
labeled G
– This sends the frame to one further station and the hub
(which will transmit the frame to all of its stations)
Hussein Al Osman CEG4190 10-18
VLAN Example (4)
• S2 port that connects to S1 is not labeled W
• This means that a frame on the white VLAN will not
be forwarded from S2 to bridge S1
• This behavior is correct because no stations on the
white VLAN are connected to S1
S1 S2
Hussein Al Osman CEG4190 10-19
VLAN Tagging
• To implement VLANs, switches need to know to which
VLAN an incoming frame belongs
• Using last example, when S2 gets a frame from S1, it need to
know whether to forward the frame on the gray or white
VLAN
• If we were designing a new type of LAN, it would be easy
enough to just add a VLAN field in the header
– But what to do about Ethernet, which is the dominant LAN, and did
not have any spare fields lying around for the VLAN identifier?
• The IEEE 802 committee changed the Ethernet header
• The new format was published in IEEE standard 802.1Q,
issued in 1998
Hussein Al Osman CEG4190 10-20
VLAN Tagging
• What to do with computer and switches that only know the
original format?
– Nothing!! The first VLAN-aware switch to touch a frame adds VLAN
fields and the last one down the road removes them
• Fields:
– VLAN protocol ID: always has the value 0x8100
– VLAN ID: 12 bits representing ID of VLAN
– Other two fields have mostly nothing to do with VLANs (since we are
changing header, we might as well add fields…)
Hussein Al Osman CEG4190 10-21
Virtual Private Networks
• VPN’s enable an organization to use Public Networks such as
the Internet, to provide a Secure connection among the
organization’s wide area network.
• Traditionally, businesses have relied on private 56-Kbps or T-
1 leased lines to connect remote offices together
• Leased lines are expensive to install and maintain
– For small companies, the cost is just too high
• Using the Internet as a backbone, a VPN can securely and
cost effectively connect all of a companies offices,
telecommuters, mobile workers, customers, partners and
suppliers.
Hussein Al Osman CEG4190 10-22
VPN Functionality
• A VPN needs to provide the following 4 critical functions:
– Authentication – ensuring that the data originates at the source that it
claims.
– Access Control – restricting unauthorized users form the network.
– Confidentiality – Preventing anyone from reading the data as it travels
through the network
– Data Integrity – Preventing anyone from tampering with the data as it
traverses through the network
Hussein Al Osman CEG4190 10-23
VPN Gateway and Tunnels
• A VPN gateway is a network device that provides encryption and
authentication service to a multitude of hosts that connect to it.
• From the outside (Internet), all communications addressed to
inside hosts flow through the gateway
• There are 2 types of end point VPN tunnels:
– Computer to Gateway
• For remote access:
generally set up for a
remote user to connect
A corporate LAN.
– Gateway to Gateway
• This the typical
Enterprise-to-enterprise
configuration. The 2 gateways
communicate with each other.
Hussein Al Osman CEG4190 10-24
VPN Tunnel Example
• Remote host (IP address 1.2.3.4) wishes to connect to a server
inside a company network
• Server has internal address 192.168.1.10 and is not reachable
publicly
• Before the client can reach this server, it needs to go through a
VPN server device that has public IP address 5.6.7.8 and an
internal address of 192.168.1.1
• All data between the client and the server will need to be kept
confidential
Hussein Al Osman CEG4190 10-25
VPN Tunnel Example
1.2.3.4
5.6.7.8 192.168.1.1
Hussein Al Osman CEG4190 10-26
VPN Tunnel Example
• The VPN client connects to a VPN server via an external network
interface
• The VPN server assigns an IP address to the VPN client from the
VPN server's subnet
– Client gets internal IP address 192.168.1.50,
– Client creates a virtual network interface through which it will send
encrypted packets to the other tunnel endpoint
– This interface also gets the address 192.168.1.50
• When the VPN client wishes to communicate with company
server, it prepares a packet addressed to 192.168.1.10, encrypts it
and encapsulates it in an IPSec packet
Hussein Al Osman CEG4190 10-27
VPN Tunnel Example
Hussein Al Osman CEG4190 10-28
VPN Tunnel Example
• This packet is then sent to the VPN server at IP address
5.6.7.8 over the public Internet
• The inner packet is encrypted so that even if someone
intercepts the packet over the Internet, they cannot get
any information from it
– They can see that the remote host is communicating with a
VPN server, but none of the contents of the communication.
– The inner encrypted packet has source address 192.168.1.50
and destination address 192.168.1.10.
– The outer packet has source address 1.2.3.4 and destination
address 5.6.7.8
Hussein Al Osman CEG4190 10-29
VPN Tunnel Example
• When the packet reaches the VPN server from
the Internet, the VPN server:
– Decapsulates the inner packet
– Decrypts it
– Finds the destination address to be 192.168.1.10
– Forwards it to the intended server at 192.168.1.10
Hussein Al Osman CEG4190 10-30
VPN Tunnel Example
• After some time, the VPN server receives a reply packet from
192.168.1.10, intended for 192.168.1.50
• The VPN server consults its routing table, and sees this packet is
intended for a remote host that must go through VPN
• The VPN server encrypts this reply packet, encapsulates it in a
VPN packet and sends it out over the Internet
• The inner encrypted packet has source address 192.168.1.10 and
destination address 192.168.1.50
• The outer VPN packet has source address 5.6.7.8 and destination
address 1.2.3.4
• The remote host receives the packet. The VPN client
unencapsulates the inner packet, decrypts it, and passes it to the
appropriate software at upper layers.
Thank You!
Hussein Al Osman CEG4190 10-31

More Related Content

PDF
GROUP-5-Distributed_sdssssssNetworks.pdf
PDF
CRS328 as a Layer 2 Switch UK MUM 2018.pdf
PPT
layer2-network-design.ppt
PPT
layer2-network-design.ppt
PPTX
PPT
mod8-VLANs.ppt
DOC
Ch3 ccna exploration 3 lan switching and wireless
GROUP-5-Distributed_sdssssssNetworks.pdf
CRS328 as a Layer 2 Switch UK MUM 2018.pdf
layer2-network-design.ppt
layer2-network-design.ppt
mod8-VLANs.ppt
Ch3 ccna exploration 3 lan switching and wireless

Similar to Virtual Local area Network and Virtual Private area Network (20)

PPTX
PPT
Mod8 vlans
PPT
PPTX
ch08.pptx
PPTX
Network virtualization
PPTX
ENCOR_Capitulo 1.pptx
PPTX
Vla ns
PPTX
VLANS Routing and Protocols Chapter 12 of Routing
PPTX
VLANs_Module_3.pptx
PPTX
SRWE_Mod-3.pptxazsDFGHJK,./.L,MNBVCXZzxCV
PPT
Chapter 1 Switch Network Device (1).ppt
DOC
Final exam ccna exploration 3 lan switching and wireless
PPT
CCNA 1
PPT
PPTX
VirtuaL area network (VLAN)
PPTX
Virtual Local Area Network
PPTX
DevOops - Lessons Learned from an OpenStack Network Architect
PPTX
CISSP - Chapter 4 - Intranet and extranets
PDF
[Mar./2014] WiFi : Filling the Big Pipe
Mod8 vlans
ch08.pptx
Network virtualization
ENCOR_Capitulo 1.pptx
Vla ns
VLANS Routing and Protocols Chapter 12 of Routing
VLANs_Module_3.pptx
SRWE_Mod-3.pptxazsDFGHJK,./.L,MNBVCXZzxCV
Chapter 1 Switch Network Device (1).ppt
Final exam ccna exploration 3 lan switching and wireless
CCNA 1
VirtuaL area network (VLAN)
Virtual Local Area Network
DevOops - Lessons Learned from an OpenStack Network Architect
CISSP - Chapter 4 - Intranet and extranets
[Mar./2014] WiFi : Filling the Big Pipe
Ad

More from poonkodiraja2806 (11)

PPTX
UNIT 1-RELATIONAL DATA MODEL for data base subject
PPTX
unit 5 in the database for master of Engineering
PPTX
UNIT II in the part of Database at the PG
PPTX
XML DATABASES in the Master of Engineering
PDF
Computer Network NFV Management and Orchestration.pdf
PPT
Principle of programming language -M.E-CSE
DOCX
Computer Network unit-5 -SDN and NFV topics
PPT
M.E - Computer Science and Engineering-Data structure B tree
PPT
M.E - Computer Science and Engineering-Data structure-bst-and-threaded
PPT
M.E - Computer Science and Engineering-Data structure avl-tree
PPT
M.E - Computer Science and Engineering-Data structure unit-2 heaps
UNIT 1-RELATIONAL DATA MODEL for data base subject
unit 5 in the database for master of Engineering
UNIT II in the part of Database at the PG
XML DATABASES in the Master of Engineering
Computer Network NFV Management and Orchestration.pdf
Principle of programming language -M.E-CSE
Computer Network unit-5 -SDN and NFV topics
M.E - Computer Science and Engineering-Data structure B tree
M.E - Computer Science and Engineering-Data structure-bst-and-threaded
M.E - Computer Science and Engineering-Data structure avl-tree
M.E - Computer Science and Engineering-Data structure unit-2 heaps
Ad

Recently uploaded (20)

PPTX
additive manufacturing of ss316l using mig welding
PPTX
Artificial Intelligence
PPTX
UNIT 4 Total Quality Management .pptx
PPTX
Fundamentals of Mechanical Engineering.pptx
PDF
737-MAX_SRG.pdf student reference guides
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PPTX
Current and future trends in Computer Vision.pptx
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
PPTX
Safety Seminar civil to be ensured for safe working.
PPTX
Geodesy 1.pptx...............................................
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Fundamentals of safety and accident prevention -final (1).pptx
PPTX
CYBER-CRIMES AND SECURITY A guide to understanding
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PDF
Embodied AI: Ushering in the Next Era of Intelligent Systems
PDF
Categorization of Factors Affecting Classification Algorithms Selection
DOCX
573137875-Attendance-Management-System-original
additive manufacturing of ss316l using mig welding
Artificial Intelligence
UNIT 4 Total Quality Management .pptx
Fundamentals of Mechanical Engineering.pptx
737-MAX_SRG.pdf student reference guides
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
Current and future trends in Computer Vision.pptx
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
null (2) bgfbg bfgb bfgb fbfg bfbgf b.pdf
Safety Seminar civil to be ensured for safe working.
Geodesy 1.pptx...............................................
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Fundamentals of safety and accident prevention -final (1).pptx
CYBER-CRIMES AND SECURITY A guide to understanding
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
Embodied AI: Ushering in the Next Era of Intelligent Systems
Categorization of Factors Affecting Classification Algorithms Selection
573137875-Attendance-Management-System-original

Virtual Local area Network and Virtual Private area Network

  • 1. Hussein Al Osman CEG4190 10-1 Lecture 10: Virtual LANs (VLAN) and Virtual Private Networks (VPN) Instructor: Hussein Al Osman
  • 2. Hussein Al Osman CEG4190 10-2 Local Area Networks • Early days of local area networking: thick yellow cables snaked through the cable ducts of office buildings – Every computer they passed was plugged in • No thought was given to which computer belonged on which LAN – People in adjacent offices were put on the same LAN – Geography trumped corporate organization charts
  • 3. Hussein Al Osman CEG4190 10-3 Local Area Networks • With advent of twisted pair and hubs in the 1990s, buildings were rewired to rip out all the yellow wires and install twisted pairs from every office to central wiring closets • If a company wants k LANs, it could buy k switches • By carefully choosing which connectors to plug into which switches, the occupants of a LAN can be chosen in a way that makes organizational sense
  • 4. Hussein Al Osman CEG4190 10-4 Virtual Local Area Networks • In many companies, organizational changes occur all the time – System administrators spend a lot of time pulling out plugs and pushing them back in somewhere else • In some cases, the change cannot be made at all because the twisted pair from the user’s machine is too far from the correct switch • Therefore, network vendors began working on a way to rewire buildings entirely in software – Resulting concept is called a VLAN (Virtual LAN) – Standardized by the IEEE 802 committee and is now widely deployed in many organizations
  • 5. Hussein Al Osman CEG4190 10-5 Virtual LANs • Description: – Group of devices on one or more physical LANs that are configured as if they are logically attached to the same wire – LAN’s based on Logical instead of Physical connections • Used to separate out users into logical groups of workers, regardless of actual physical location.
  • 6. Hussein Al Osman CEG4190 10-6 Virtual LANs • Usage scenarios: – Say you want workers assigned to the same project to be grouped logically together for control of traffic but they are physically located in different physical areas – Say you want to divide up the broadcast domain in a large flat network without using a bunch of routers • Must be supported by the switch: switches must have the ability to support more than one subnet
  • 7. Hussein Al Osman CEG4190 10-7 Virtual LANs • To set up a VLAN-based network, the network designer/administrator decides: – How many VLANs there will be – Which computers will be on which VLAN – What the VLANs will be called • Often the VLANs are (informally) named by colors – Since it is then possible to print color diagrams showing the physical layout of the machines, with the members of the red LAN in red, members of the green LAN in green, and so on
  • 8. Hussein Al Osman CEG4190 10-8 VLAN Levels • At the User Level • At the Wiring Closet Level • AT the Distribution Switch Level
  • 9. Hussein Al Osman CEG4190 10-9 User Level VLAN • Users belong to a specific VLAN regardless of where they attach to the network • User can “roam” on the network • Beneficial when traffic stays on the VLAN • However, broadcast traffic will follow the user
  • 10. Hussein Al Osman CEG4190 10-10 User Movement If Host A moves to a different Workgroup Switch, the Broadcast Domain follows the movement of Host A.
  • 11. Hussein Al Osman CEG4190 10-11 Wiring Closet VLAN VLAN 1 based on Workgroup Switch • People must be physically close together on same VLAN • Broadcast traffic will not follow the user
  • 12. Hussein Al Osman CEG4190 10-12 User Movement If Host A moves to a different Workgroup Switch, it belongs to a new VLAN. Broadcast Domain stays with the switch, and does not follow Host A.
  • 13. Hussein Al Osman CEG4190 10-13 Distribution Switch VLAN VLAN 1 based on Distribution Switch • Middle ground between User and Wiring Closet designs • If users move but stay on the same distribution switch - Same VLAN • If users move to different distribution switch, then it’s a Different VLAN
  • 14. Hussein Al Osman CEG4190 10-14 User Movement If Host A moves to a different Distribution Switch, the Broadcast Domain follows Host A since it stays on the same distribution switch.
  • 15. Hussein Al Osman CEG4190 10-15 VLAN Example (1) • Nine of the machines belong to the G (gray) VLAN and five belong to the W (white) VLAN • Machines from the gray VLAN are spread across two switches, including two machines that connect to a switch via a hub S1 S2
  • 16. Hussein Al Osman CEG4190 10-16 VLAN Example (2) • To make the VLANs function correctly, configuration tables have to be set up in the switches • These tables tell which VLANs are accessible via which ports – Note that a port may be labeled with multiple VLAN colors • When a frame comes in from the gray VLAN, it must be forwarded on all the ports marked with a G for: – Ordinary (i.e., unicast) traffic where the switch has not learned the location of the destination – Broadcast traffic
  • 17. Hussein Al Osman CEG4190 10-17 VLAN Example (3) • Suppose that one of the gray stations plugged into S1 sends a frame to a destination that has not been seen before by S1 – S1 will receive the frame and flood the frame on all ports labeled G (except the incoming port) – The frame will be sent to the five other gray stations attached to S1 as well as over the link from S1 to S2 – At switch S2, the frame is similarly forwarded on all ports labeled G – This sends the frame to one further station and the hub (which will transmit the frame to all of its stations)
  • 18. Hussein Al Osman CEG4190 10-18 VLAN Example (4) • S2 port that connects to S1 is not labeled W • This means that a frame on the white VLAN will not be forwarded from S2 to bridge S1 • This behavior is correct because no stations on the white VLAN are connected to S1 S1 S2
  • 19. Hussein Al Osman CEG4190 10-19 VLAN Tagging • To implement VLANs, switches need to know to which VLAN an incoming frame belongs • Using last example, when S2 gets a frame from S1, it need to know whether to forward the frame on the gray or white VLAN • If we were designing a new type of LAN, it would be easy enough to just add a VLAN field in the header – But what to do about Ethernet, which is the dominant LAN, and did not have any spare fields lying around for the VLAN identifier? • The IEEE 802 committee changed the Ethernet header • The new format was published in IEEE standard 802.1Q, issued in 1998
  • 20. Hussein Al Osman CEG4190 10-20 VLAN Tagging • What to do with computer and switches that only know the original format? – Nothing!! The first VLAN-aware switch to touch a frame adds VLAN fields and the last one down the road removes them • Fields: – VLAN protocol ID: always has the value 0x8100 – VLAN ID: 12 bits representing ID of VLAN – Other two fields have mostly nothing to do with VLANs (since we are changing header, we might as well add fields…)
  • 21. Hussein Al Osman CEG4190 10-21 Virtual Private Networks • VPN’s enable an organization to use Public Networks such as the Internet, to provide a Secure connection among the organization’s wide area network. • Traditionally, businesses have relied on private 56-Kbps or T- 1 leased lines to connect remote offices together • Leased lines are expensive to install and maintain – For small companies, the cost is just too high • Using the Internet as a backbone, a VPN can securely and cost effectively connect all of a companies offices, telecommuters, mobile workers, customers, partners and suppliers.
  • 22. Hussein Al Osman CEG4190 10-22 VPN Functionality • A VPN needs to provide the following 4 critical functions: – Authentication – ensuring that the data originates at the source that it claims. – Access Control – restricting unauthorized users form the network. – Confidentiality – Preventing anyone from reading the data as it travels through the network – Data Integrity – Preventing anyone from tampering with the data as it traverses through the network
  • 23. Hussein Al Osman CEG4190 10-23 VPN Gateway and Tunnels • A VPN gateway is a network device that provides encryption and authentication service to a multitude of hosts that connect to it. • From the outside (Internet), all communications addressed to inside hosts flow through the gateway • There are 2 types of end point VPN tunnels: – Computer to Gateway • For remote access: generally set up for a remote user to connect A corporate LAN. – Gateway to Gateway • This the typical Enterprise-to-enterprise configuration. The 2 gateways communicate with each other.
  • 24. Hussein Al Osman CEG4190 10-24 VPN Tunnel Example • Remote host (IP address 1.2.3.4) wishes to connect to a server inside a company network • Server has internal address 192.168.1.10 and is not reachable publicly • Before the client can reach this server, it needs to go through a VPN server device that has public IP address 5.6.7.8 and an internal address of 192.168.1.1 • All data between the client and the server will need to be kept confidential
  • 25. Hussein Al Osman CEG4190 10-25 VPN Tunnel Example 1.2.3.4 5.6.7.8 192.168.1.1
  • 26. Hussein Al Osman CEG4190 10-26 VPN Tunnel Example • The VPN client connects to a VPN server via an external network interface • The VPN server assigns an IP address to the VPN client from the VPN server's subnet – Client gets internal IP address 192.168.1.50, – Client creates a virtual network interface through which it will send encrypted packets to the other tunnel endpoint – This interface also gets the address 192.168.1.50 • When the VPN client wishes to communicate with company server, it prepares a packet addressed to 192.168.1.10, encrypts it and encapsulates it in an IPSec packet
  • 27. Hussein Al Osman CEG4190 10-27 VPN Tunnel Example
  • 28. Hussein Al Osman CEG4190 10-28 VPN Tunnel Example • This packet is then sent to the VPN server at IP address 5.6.7.8 over the public Internet • The inner packet is encrypted so that even if someone intercepts the packet over the Internet, they cannot get any information from it – They can see that the remote host is communicating with a VPN server, but none of the contents of the communication. – The inner encrypted packet has source address 192.168.1.50 and destination address 192.168.1.10. – The outer packet has source address 1.2.3.4 and destination address 5.6.7.8
  • 29. Hussein Al Osman CEG4190 10-29 VPN Tunnel Example • When the packet reaches the VPN server from the Internet, the VPN server: – Decapsulates the inner packet – Decrypts it – Finds the destination address to be 192.168.1.10 – Forwards it to the intended server at 192.168.1.10
  • 30. Hussein Al Osman CEG4190 10-30 VPN Tunnel Example • After some time, the VPN server receives a reply packet from 192.168.1.10, intended for 192.168.1.50 • The VPN server consults its routing table, and sees this packet is intended for a remote host that must go through VPN • The VPN server encrypts this reply packet, encapsulates it in a VPN packet and sends it out over the Internet • The inner encrypted packet has source address 192.168.1.10 and destination address 192.168.1.50 • The outer VPN packet has source address 5.6.7.8 and destination address 1.2.3.4 • The remote host receives the packet. The VPN client unencapsulates the inner packet, decrypts it, and passes it to the appropriate software at upper layers.
  • 31. Thank You! Hussein Al Osman CEG4190 10-31