VPNs are a way for remote access employees to gain secure access to corporate networks. A VPN is a secure connection over an unsecure network—the Internet. Communication security over the VPN is provided through encryption. VPNs can also be used for secure communications between two network devices or two users. A connection, VPN software, appropriate protocols, and the same encryption methods are required for a VPN connection.
A VPN establishes a private network over a public network such as the Internet. Instead of dialing in over a telephone line, a VPN uses an Internet connection that the systems have already established. As previously discussed, remote users may benefit from Internet connections provided in public locations such as hotels, coffee shops, and airports. This connection is beneficial when you want to do personal work such as checking personal email or browsing social networking sites. Organizations, however, are not inclined to leave their infrastructure open. Organizations want to ensure that their intranet is available only to employees and that corporate resources are protected. Implementing a VPN environment provides many of the same benefits an employee experiences when connected directly to the corporate network within a corporate infrastructure.
Organizations can also employ VPN capabilities for internal wireless networks. Although you may be able to connect directly to a corporate access point, a VPN connection may be required for you to access internal corporate resources. This implementation ensures security for you and the organization, even when you are still in the organization’s building.
Virtual private networking requires a tunnel. Some of the tunneling protocols that are used for VPN connections are as follows:
IPSec provides authentication and encryption through two security protocols. Authentication Header (AH) is the authentication protocol. Encapsulating Security Payload (ESP) provides authentication and encryption. AH is used to prove the identity of the sender and ensure the data is not tampered with. ESP encrypts the IP packets and ensures their integrity. IPSec can work in two modes, transport mode or tunnel mode. In transport mode, the message payload is protected. This ensures that the messages cannot be read if the traffic is collected. In tunnel mode, the payload, routing, and header information are protected. ESP provides greater security than AH because it protects the routing and header information.
A security association (SA) is used for each device during each VPN connection. The SA is the record of the configuration that the device needs to support an IPSec connection. When the two systems agree on the parameters used for communication, the data are stored in the SA. The SA may contain the authentication and encryption keys, algorithms, key lifetime, and source IP address. When the system receives the packet over the IPSec protocol, the SA will determine how to decrypt the packet, how to authenticate the source packet, the encryption key to use, and if necessary, how to replay the message. A different SA is used for inbound and outbound traffic.
Internet Key Exchange (IKE), as defined in RFC 2409, provides identification to communication partners via a secure connection. IKE is the de facto standard for IPSec. It is a combination of Internet Security Association and Key Management Protocol (ISAKMP) and OAKLEY. The OAKLEY protocol carries out the negotiation process, and ISAKMP provides the framework for the negotiation. This includes the negotiation for the algorithm, protocol, modes, and keys. The partners can authenticate through a shared secret or public key encryption. Once this is determined, the SAs are established.