Multi Protocol Label Switching vpn and SDN

Cards (44)

  • Multi Protocol Label Switching (MPLS)

    An IP packet routing technique that routes IP packet through paths via labels instead of looking at complex routing tables of routers
  • MPLS
    • Uses layer 3 service i.e, Internet Protocol, and uses router as forwarding device
    • Separates the traffic of different customers from each other
    • Adds an MPLS header to the packet that lies between layers 2 and 3, hence considered a Layer 2.5 protocol
  • MPLS Header

    32 bit long, divided into 4 parts: Label (20 bits), Exp (3 bits for QoS), Bottom of stack (1 bit), Time to Live (8 bits)
  • MPLS Routing

    1. LSRs receive IP packet, add an MPLS header, forward to neighbouring LSR
    2. LSRs learn routes and add to Label Forwarding Information Base (LFIB)
    3. When a PE receives a packet, LSRs can easily forward it by looking at labels and LFIB
  • MPLS Routing
    • Allows receiving packets containing frames from different protocols like Frame Relay, Metro Ethernet, etc
    • Forwarding is based on label attached to IP packet, regulated by Label Distribution Protocol (LDP)
  • Traditional IP based routing

    IP datagram packet is analyzed by the router and forwarded based on source and destination address in routing table
  • MPLS routing

    Assigns a label to each packet, which acts as a transmission path established by signaling protocols, to guide the packet to its destination
  • MPLS vs Traditional IP routing

    MPLS is more efficient, dynamic, scalable and has better performance and bandwidth utilization compared to traditional IP routing
  • MPLS Pros

    • Better performance, better bandwidth utilization, reduced network traffic congestion
    • Secure transmission mode, not easily vulnerable to DOS attacks
    • Separated from public Internet
  • MPLS Cons

    • Needs to purchase carrier frequency, more costly than public network transmission
    • Difficult to find global MPLS service provider as organization expands
    • Not suited where branch offices directly access cloud data
  • Virtual Private Network (VPN)

    A technology that creates a safe and encrypted connection over a less secure network, such as the internet
  • Types of VPN

    • Remote Access VPN
    • Site-to-Site VPN (Intranet, Extranet)
    • Cloud VPN
    • Mobile VPN
    • SSL VPN
    • PPTP VPN
    • L2TP VPN
    • OpenVPN
  • Remote Access VPN

    Permits a user to securely connect to a private network and access its services and resources remotely
  • Site-to-Site VPN

    Connects the network of one office location to the network at another office location
  • Cloud VPN

    Allows users to securely connect to a cloud-based infrastructure or service
  • Mobile VPN

    Allows mobile users to securely connect to a private network, typically through a cellular network
  • SSL VPN

    Uses the SSL protocol to secure the connection between the user and the VPN server, accessed through a web browser
  • PPTP VPN

    Uses a simple and fast method for implementing VPNs, creates a secure connection by encapsulating data packets
  • L2TP VPN

    Creates a secure connection by encapsulating data packets, adds more security than PPTP by using a combination of PPTP and L2F
  • OpenVPN
    Open-source software that uses SSL/TLS encryption, highly configurable and secure
  • VPN Protocols

    • IPSec
    • L2TP
    • PPTP
    • SSL/TLS
  • L2TP VPN connection

    1. L2TP generates a tunnel between two L2TP connection points
    2. IPSec protocol encrypts the data and maintains secure communication between the tunnel
  • PPTP VPN connection

    1. PPTP generates a tunnel and confines the data packet
    2. Point-to-Point Protocol (PPP) is used to encrypt the data between the connection
  • PPTP
    One of the most widely used VPN protocol, has been in use since the early release of Windows, also used on Mac and Linux
  • SSL/TLS VPN connection

    1. SSL/TLS generate a VPN connection where the web browser acts as the client and user access is prohibited to specific applications instead of entire network
    2. Online shopping websites commonly use SSL and TLS protocol
    3. SSL connections have "https" in the initial of the URL instead of "http"
  • SSH VPN connection

    1. SSH generates the VPN tunnel through which the data transfer occurs and also ensures that the tunnel is encrypted
    2. SSH connections are generated by a SSH client and data is transferred from a local port on to the remote server through the encrypted tunnel
  • SSTP
    A VPN protocol developed by Microsoft that uses SSL to secure the connection, but only available for Windows
  • IKEv2
    A VPN protocol that provides fast and secure connections, but not widely supported by VPN providers
  • OpenVPN
    An open-source VPN protocol that is highly configurable and secure, widely supported by VPN providers and considered one of the most secure VPN protocols
  • WireGuard
    A relatively new and lightweight VPN protocol that aims to be faster, simpler and more secure than existing VPN protocols
  • Features of VPN

    • Provides plentiful Server location
    • Provides anonymous DNS servers
    • Generally cost-effective
    • Supports Router
    • Highly encrypted and secure
    • Provides secure VPN protocols
    • Provides safety against DNS Leak
    • Offers Cross-Platform Compatible Apps
  • What a VPN can hide

    • User's Browsing History
    • User's IP address and location
    • User's location for streaming
    • User's device
    • User's web activity — to preserve internet freedom
  • Questions to ask VPN providers

    • How much privacy the VPN is providing
    • Are you able to run all security protocols
    • Do they set any limits on your data
    • Where is the server of your VPN located
    • Are all your devices able to access VPN
    • What is the cost of a VPN
  • Advantages of VPN

    • Provides Anonymity
    • Avoids Geo-Restrictions
    • Provides Security Protection from Cyberattacks
    • Prevents Bandwidth Throttling
    • Improves Gaming Experience
    • Bypasses Firewall
  • Disadvantages of VPN

    • Can Slow down the Internet Speed
    • Has Privacy Issues
    • Can have Connection droppings
    • Can have Configuration difficulties
    • Has Legality Issues
  • Advantages of VPN

    • Provides Security by encrypting data and hiding IP address
    • Offers Privacy by masking identity and location
    • Allows access to geo-restricted content
    • Is Flexible and can be used with various devices
    • Allows Remote access to company network
  • Disadvantages of VPN

    • Can cause Slower internet speeds
    • Can have Higher cost due to subscription fees
    • Risk of malware from free VPN services
  • VPN vs MPLS
    VPN and MPLS are different networking technologies
  • Software Defined Networking (SDN)

    Networking architecture approach that enables control and management of the network using software applications
  • Components of SDN

    • SDN Applications
    • SDN Controller
    • SDN Networking Devices