DESIGN ALTERNATIVES FOR Virtual Private Networks

G. I. Papadimitriou, M. S. Obaidat, C. Papazoglou, C. S. Pomportsis

2004

Abstract

Virtual private networks (VPNs) are becoming more and more important for all kinds of businesses with a wide spectrum of applications and configurations. This paper presents the basic concepts related to VPNs. These include the different types of VPN services, namely Intranet, Extranet and Remote Access VPNs. The concept of tunneling, which is fundamental in VPNs, is discussed in great detail. The tunneling protocols that are employed by VPNs, such as PPTP, L2TP and IPSec are also presented. Furthermore, the issue of Quality of Service, QoS, support in VPN configurations is briefly addressed.

References

  1. Ferguson, P. and Huston, G., 1998. What is a VPN?. White paper, available online at http://www.employees.org/ferguson.
  2. Hunt, R. and Rodgers, C., 2003. Virtual Private Networks: Strong Security at What Cost?. Available at http://citeseer.nj.nec.com/555428.html.
  3. Arora, P, Vemuganti, P.R. and Allani, P., 2001. Comparison of VPN Protocols - IPSec, PPTP, and L2TP. Project Report ECE 646, Fall 2001, available at http://ece.gmu.edu/courses/ECE543/reportsF01/arveal.pdf.
  4. Strayer, W.T. and Yuan, R., 2001, Introduction to virtual private networks. Available online at http://www.awprofessional.com/articles/.
  5. Brahim, H.O., Wright, G., Gleeson, B., Bach, R., Sloane, T., Young, A., Bubenik, R., Fang.L., Sargor, C., Weber, C., Negusse, I., Yu, J. J., 2003. Network based IP VPN Architecture using Virtual Routers, Internet draft <draft-ietf-l3vpn-vpn-vr-00.txt>.
  6. Younglove, R., 2000. Virtual Private Networks: Secure Access for E-Business. IEEE Internet Computing, pp. 96, Volume 4, Number 4.
  7. Günter, M., 2001. Virtual Private Networks over the Internet. Available at http://citeseer.nj.nec.com/480338.html.
  8. Wright, M. A., 2000. Virtual Private Network Security. Network-Security, pp. 11-14, July 2000.
  9. Network Working Group (Simpson, W., Editor), 1994. The Point-to-Point Protocol (PPP). RFC 1661.
  10. Boon, S., 2003. Delivering the Foundations for Joined up E-Government. Available at http://www.publicnet.co.uk/publicnet/fe031021.htm
  11. Boudriga N. and Obaidat, M. S., 2002. Driving Citizens to Information and Communications Technology. Mediterranean Development Forum 4, October 2002.
  12. Cohen, R., 2003. On the Establishment of an Access VPN in Broadband Access Networks. IEEE Communications Magazine, pp. 156-163, February 2003.
  13. Braun, T., Günter, M., Kasumi, M. and Khalil, I., 1999. Virtual Private Network Architecture. CATI Project Deliverable, January 1999, available at http://www.tik.ee.ethz.ch/cati/deliverables.html.
  14. Harding, A., 2003. SSL Virtual Private Networks. Computers & Security, Volume 22, Issue 5, pp. 416-420, July 2003.
  15. Ribeiro S., Silva F. and Zuquete A., 2004. A Roaming Authentication Solution for Wifi using IPSec VPNs with client certificates, TERENA Networking Conference, June 2004.
  16. Srisuresh P. and Holdrege M., 1999. IP Network Address Translator (NAT) Terminology and Considerations. RFC 2663.
  17. Rosenbaum, G., Lau, W. and Jha, S., 2003. Recent directions in virtual private network solutions. IEEE International Conference on Networks (ICON 2003), September 2003.
  18. Gleeson, B., Lin, A, Heinanen, J., Armitage, G. and Malis, A., 2000. A Framework for IP Based Virtual Private Networks. RFC 2764.
  19. Pall, G., Verthein, W., Taarud, J., Little, W. and Zorn, G., 1999. Point-to-Point Tunneling Protocol (PPTP). RFC 2637.
  20. Hanks, S., Li, T., Farinacci, D. and Traina, P., 1994. Generic Routing Encapsulation (GRE), RFC 1701.
  21. Townsley, W., Valencia, A., Rubens, A., Pall, G., Zorn, G. and Palter, B., 1999. Layer Two Tunneling Protocol. RFC 2661.
  22. Yuan, R., 2002. The VPN Client and the Windows Operating System. January 2002. Available online at: http://www.awprofessional.com/articles/
  23. Rekhter Y., Watson T.J. and Li T., 1995. A Border Gateway Protocol 4 (BGP-4). RFC 1771.
  24. Patel B., Aboba B., Dixon W., Zorn G. and Booth S., 2001. Securing L2TP using IPsec. RFC 3193.
  25. Tomsu P. and Wieser G., 2002. MPLS-Based VPNs - Designing Advanced Virtual Networks, Prentice-Hall.
  26. Zeng J. and Ansari N., 2003. Toward IP Virtual Private Network Quality of Service: A Service Provider Perspective. IEEE Communications Magazine, pp. 113-119, April 2003.
  27. Braun T., Guenter M. and Khalil I., 2001. Management of Quality of Service Enabled VPNs. IEEE Communications Magazine, pp. 90-98, May 2001.
Download


Paper Citation


in Harvard Style

I. Papadimitriou G., S. Obaidat M., Papazoglou C. and S. Pomportsis C. (2004). DESIGN ALTERNATIVES FOR Virtual Private Networks . In Proceedings of the 1st International Workshop on Electronic Government and Commerce: Design, Modeling, Analysis and Security - Volume 1: EGCDMAS, (ICETE 2004) ISBN 972-8865-17-1, pages 35-45. DOI: 10.5220/0001404400350045


in Bibtex Style

@conference{egcdmas04,
author={G. I. Papadimitriou and M. S. Obaidat and C. Papazoglou and C. S. Pomportsis},
title={DESIGN ALTERNATIVES FOR Virtual Private Networks},
booktitle={Proceedings of the 1st International Workshop on Electronic Government and Commerce: Design, Modeling, Analysis and Security - Volume 1: EGCDMAS, (ICETE 2004)},
year={2004},
pages={35-45},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0001404400350045},
isbn={972-8865-17-1},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 1st International Workshop on Electronic Government and Commerce: Design, Modeling, Analysis and Security - Volume 1: EGCDMAS, (ICETE 2004)
TI - DESIGN ALTERNATIVES FOR Virtual Private Networks
SN - 972-8865-17-1
AU - I. Papadimitriou G.
AU - S. Obaidat M.
AU - Papazoglou C.
AU - S. Pomportsis C.
PY - 2004
SP - 35
EP - 45
DO - 10.5220/0001404400350045