Page 467 - StudyBook.pdf
P. 467

Topologies and IDS • Chapter 7  451


                 EXAM WARNING
                      Tunneling is used in conjunction with encryption to provide total end-
                      to-end data protection across an untrustworthy network, such as the
                      Internet. Point-to-Point Tunneling Protocol (PPTP) and Layer 2 Tunneling
                      Protocol (L2TP) are popular VPN tunneling protocols, while Microsoft
                      Point-to-Point Encryption (MPPE) and IPSec are their encryption counter-
                      parts. Do not confuse tunneling with encryption.




                    VPN tunneling provides confidentiality of data, in that the traffic is encrypted,
                 typically using MPPE or IPSec.VPNs created using the L2TP use IPSec for
                 encryption, whereas tunnels created with the PPTP use MPPE.Windows XP and
                 newer Microsoft OSes can use IPSec; all older versions must use MPPE.
                    Most other new OSes also provide support for L2TP and IPSec.Tunnels can
                 also be created using IPSec alone (without L2TP) or using Secure Shell (SSH) or
                 Crypto Internet Protocol Encapsulation (CIPE) in Linux/UNIX environments. It
                 is important to understand that tunneling and encryption are two separate pro-
                 cesses, both of which are necessary to create a VPN.
                    For more information about VPN technologies, see http://en.wikipedia.
                 org/wiki/VPN.Tunneling is often used when configuring and implementing an
                 extranet solution, but is not limited to usage only in that situation. Consider Figure
                 7.12, where we have created a VPN tunnel from your network to the network of a
                 business partner.

                 Figure 7.12 Setting Up a Business-to-business VPN
                                           VPN tunnel through the Internet from one
                                           intranet to another intranet provides for secure
                         Partner Network   and authentic communications.         Your Network



                                                     Internet
                    VPN Server  Firewall                                  Firewall   VPN Server



                    You can also establish a VPN from your home computer to the corporate net-
                 work by making use of your ISP connection, as shown in Figure 7.13.







                                                                              www.syngress.com
   462   463   464   465   466   467   468   469   470   471   472