03. Lab 3 - VPN

Mini Lecture

Set up of commercial VPNs.

Device --Encrypted Pipe–> VPN Server --> Internal Network

Does everything need to go through a VPN?

Area of risk: the internet.

Traffic through internal network can be unencrypted; but at the edge of the network (the router), the data should be encrypted as it goes through the big bad internet. Once it hits the other internal network (e.g. difference office), it can be decrypted again.

That is, VPNs create secure distributed networks.

Types of networks:

Design consideration:

Types:

OpenVPN:

SSLVPN:

IPSec:

Authentication only:

Encapsulating security payload:

IKEv2:

TODO

IKEv2 and OpenVPN, each tunnel (device) has its own IP address. Hence, pool of IP address pool required.

IP layer so no ports. So on internal network each VPN-connected device has its own virtual IP

IKEv2 done on router with hardware crypto module