D-Link DFL-200 Product Manual - Page 42

VPN, Introduction to IPSec, Subnet Local Net, Destination Gateway If LAN-to-LAN - forum

Page 42 highlights

VPN Introduction to IPSec This chapter introduces IPSec, the method, or rather set of methods used to provide VPN functionality. IPSec, Internet Protocol Security, is a set of protocols defined by the IETF, Internet Engineering Task Force, to provide IP security at the network layer. An IPSec based VPN, such as that of the DFL-200, is made up of two basic parts: • Internet Key Exchange security protocol (IKE) • IPSec protocol (ESP) The first part, IKE, is the initial negotiation phase, where the two VPN endpoints agree on which methods will be used to provide security for the underlying IP traffic. Furthermore, IKE is used to manage connections, by defining a set of Security Associations (SA), for each connection. Each SA is unidirectional, so there will be at least two SA per IPSec connection. The other part is the actual IP data being transferred, using the encryption and authentication methods agreed upon in the IKE negotiation. This can be accomplished in a number of ways; by using the IPSec protocol ESP. To set up an IPSec Virtual Private Network (VPN), you do not need to configure an Access Policy to enable encryption. Just fill in the following settings: VPN Name, Source Subnet (Local Net), Destination Gateway (If LAN-to-LAN), Destination Subnet (If LAN-to-LAN), and Authentication Method (Pre-shared key or Certificate). The firewalls on both ends must use the same Pre-shared key or set of Certificates and IPSec lifetime to make a VPN connection. Introduction to PPTP PPTP, Point-to-Point Tunneling Protocol, jointly developed by Microsoft, US Robotics, and various other remote access companies known collectively as the PPTP Forum, is used to provide IP security at the network layer. A PPTP based VPN is made up by these parts: • Point-to-Point Protocol (PPP) • Authentication Protocols (PAP, CHAP, MS-CHAP v1, MS-CHAP v2) • Microsoft Point-To-Point Encryption (MPPE) • Generic Routing Encapsulation (GRE) PPTP uses TCP port 1723 for it's control connection and uses GRE (IP protocol 47) for the PPP data. PPTP supports data encryption by using MPPE. 42

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132

42
VPN
Introduction to IPSec
This chapter introduces IPSec, the method, or rather set of methods used to provide VPN
functionality. IPSec, Internet Protocol Security, is a set of protocols defined by the IETF,
Internet Engineering Task Force, to provide IP security at the network layer.
An IPSec based VPN, such as that of the DFL-200, is made up of two basic parts:
Internet Key Exchange security protocol (IKE)
IPSec protocol (ESP)
The first part, IKE, is the initial negotiation phase, where the two VPN endpoints agree on
which methods will be used to provide security for the underlying IP traffic. Furthermore, IKE
is used to manage connections, by defining a set of Security Associations (SA), for each
connection. Each SA is unidirectional, so there will be at least two SA per IPSec connection.
The other part is the actual IP data being transferred, using the encryption and authentication
methods agreed upon in the IKE negotiation. This can be accomplished in a number of ways;
by using the IPSec protocol ESP.
To set up an IPSec Virtual Private Network (VPN), you do not need to configure an
Access Policy to enable encryption. Just fill in the following settings: VPN Name, Source
Subnet (Local Net), Destination Gateway (If LAN-to-LAN), Destination Subnet (If LAN-to-LAN),
and Authentication Method (Pre-shared key or Certificate). The firewalls on both ends must
use the same Pre-shared key or set of Certificates and IPSec lifetime to make a VPN
connection.
Introduction to PPTP
PPTP, Point-to-Point Tunneling Protocol, jointly developed by Microsoft, US Robotics,
and various other remote access companies known collectively as the PPTP Forum, is used
to provide IP security at the network layer.
A PPTP based VPN is made up by these parts:
Point-to-Point Protocol (PPP)
Authentication Protocols (PAP, CHAP, MS-CHAP v1, MS-CHAP v2)
Microsoft Point-To-Point Encryption (MPPE)
Generic Routing Encapsulation (GRE)
PPTP uses TCP port 1723 for it's control connection and uses GRE (IP protocol 47) for
the PPP data. PPTP supports data encryption by using MPPE.