Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Digging into VPN. How ISP determines that it's Remote access VPN traffic?

Posted on 2015-02-14
6
Medium Priority
?
112 Views
Last Modified: 2015-02-14
How ISP determines that it's Remote Access VPN traffic?
What about network protocols which are used for VPN?
What about roles of switches on VPN.
0
Comment
Question by:Nusrat Nuriyev
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 2
6 Comments
 
LVL 98

Assisted Solution

by:John Hurst
John Hurst earned 2000 total points
ID: 40609786
Simply, VPN passes TCP/IP packets that are encrypted. So the same rules apply at each end with regard to packets. The encryption is only in the tunnel.

Switches pass traffic at each end in a normal fashion.

I am not sure what an ISP knows about VPN. Generally VPN is independent of ISP, except that ISP's (and Hotels and like) can determine that VPN is being used (not see what is inside) and upcharge for it.

The VPN packets have header bytes that will say it is VPN and some of the characteristics of the overall packet.
0
 

Author Comment

by:Nusrat Nuriyev
ID: 40609987
Wait, you mean switch or routers?
Or the VPN scheme virtually may be like this?
office_1 <switch/router> ISP_1 <-> internet <-> ISP_2 <switch/router> office_2
Could you please explain what does mean tunnel?
0
 
LVL 98

Assisted Solution

by:John Hurst
John Hurst earned 2000 total points
ID: 40609988
VPN forms an encrypted tunnel inside the middle internet portion . That is done to secure the data. The encapsulation is called a tunnel.
0
Windows Server 2016: All you need to know

Learn about Hyper-V features that increase functionality and usability of Microsoft Windows Server 2016. Also, throughout this eBook, you’ll find some basic PowerShell examples that will help you leverage the scripts in your environments!

 

Author Comment

by:Nusrat Nuriyev
ID: 40609996
So, up to ISP, it goes unencrypted? But how the ISP network equipment determine that it must be encrypted after it?

Does VPN technology form new packet and put the original TCP packet inside of the payload of new packet with new header?  Does VPN make an envelope with encrypted content on top of TCP packet?

Could we say that VPN is an just ecnrypts connection  and affects to all protocols on computers on both sides, comparing with HTTPS which secures only HTTP?
0
 
LVL 98

Accepted Solution

by:
John Hurst earned 2000 total points
ID: 40610035
how the ISP network equipment determine that it must be encrypted after it?

The ISP has nothing to do with the encryption, encapsulation, or tunnel. That is up to the VPN (Virtual Private Network) hardware or software on each end.

Does VPN technology form new packet and put the original TCP packet inside <-- More or less, yes. and that is what isolates from the ISP.

VPN is not HTTPS at all. Apples and oranges.

The VPN encrypts at one end and unencrypts at the other end. The overall traffic is just TCP/IP.
0
 
LVL 98

Expert Comment

by:John Hurst
ID: 40610064
@Nusrat Nuriyev  - Thank you and I was happy to help. VPN (in the detail) is complicated. Good luck with your learning about it.
0

Featured Post

NFR key for Veeam Backup for Microsoft Office 365

Veeam is happy to provide a free NFR license (for 1 year, up to 10 users). This license allows for the non‑production use of Veeam Backup for Microsoft Office 365 in your home lab without any feature limitations.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Let’s list some of the technologies that enable smooth teleworking. 
Will you be ready when the clock on GDPR compliance runs out? Is GDPR even something you need to worry about? Find out more about the upcoming regulation changes and download our comprehensive GDPR checklist today !
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
In this brief tutorial Pawel from AdRem Software explains how you can quickly find out which services are running on your network, or what are the IP addresses of servers responsible for each service. Software used is freeware NetCrunch Tools (https…

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question