?
Solved

Digging into VPN. How ISP determines that it's Remote access VPN traffic?

Posted on 2015-02-14
6
Medium Priority
?
114 Views
Last Modified: 2015-02-14
How ISP determines that it's Remote Access VPN traffic?
What about network protocols which are used for VPN?
What about roles of switches on VPN.
0
Comment
Question by:Nusrat Nuriyev
  • 4
  • 2
6 Comments
 
LVL 100

Assisted Solution

by:John Hurst
John Hurst earned 2000 total points
ID: 40609786
Simply, VPN passes TCP/IP packets that are encrypted. So the same rules apply at each end with regard to packets. The encryption is only in the tunnel.

Switches pass traffic at each end in a normal fashion.

I am not sure what an ISP knows about VPN. Generally VPN is independent of ISP, except that ISP's (and Hotels and like) can determine that VPN is being used (not see what is inside) and upcharge for it.

The VPN packets have header bytes that will say it is VPN and some of the characteristics of the overall packet.
0
 

Author Comment

by:Nusrat Nuriyev
ID: 40609987
Wait, you mean switch or routers?
Or the VPN scheme virtually may be like this?
office_1 <switch/router> ISP_1 <-> internet <-> ISP_2 <switch/router> office_2
Could you please explain what does mean tunnel?
0
 
LVL 100

Assisted Solution

by:John Hurst
John Hurst earned 2000 total points
ID: 40609988
VPN forms an encrypted tunnel inside the middle internet portion . That is done to secure the data. The encapsulation is called a tunnel.
0
Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

 

Author Comment

by:Nusrat Nuriyev
ID: 40609996
So, up to ISP, it goes unencrypted? But how the ISP network equipment determine that it must be encrypted after it?

Does VPN technology form new packet and put the original TCP packet inside of the payload of new packet with new header?  Does VPN make an envelope with encrypted content on top of TCP packet?

Could we say that VPN is an just ecnrypts connection  and affects to all protocols on computers on both sides, comparing with HTTPS which secures only HTTP?
0
 
LVL 100

Accepted Solution

by:
John Hurst earned 2000 total points
ID: 40610035
how the ISP network equipment determine that it must be encrypted after it?

The ISP has nothing to do with the encryption, encapsulation, or tunnel. That is up to the VPN (Virtual Private Network) hardware or software on each end.

Does VPN technology form new packet and put the original TCP packet inside <-- More or less, yes. and that is what isolates from the ISP.

VPN is not HTTPS at all. Apples and oranges.

The VPN encrypts at one end and unencrypts at the other end. The overall traffic is just TCP/IP.
0
 
LVL 100

Expert Comment

by:John Hurst
ID: 40610064
@Nusrat Nuriyev  - Thank you and I was happy to help. VPN (in the detail) is complicated. Good luck with your learning about it.
0

Featured Post

Evaluating UTMs? Here's what you need to know!

Evaluating a UTM appliance and vendor can prove to be an overwhelming exercise.  How can you make sure that you're getting the security that your organization needs without breaking the bank? Check out our UTM Buyer's Guide for more information on what you should be looking for!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

SSL is a very common protocol used these days when browsing the web.  The purpose is to provide security to communication, but how does it do it?  There are several pieces at work that have to be setup before SSL will even work and it requires both …
This is the first one of a series of articles I’ll be writing to address technical issues that are always referred to as network problems. The network boundaries have changed, therefore having an understanding of how each piece in the network  puzzl…
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Suggested Courses
Course of the Month12 days, 19 hours left to enroll

580 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question