Solved

Digging into VPN. How ISP determines that it's Remote access VPN traffic?

Posted on 2015-02-14
6
107 Views
Last Modified: 2015-02-14
How ISP determines that it's Remote Access VPN traffic?
What about network protocols which are used for VPN?
What about roles of switches on VPN.
0
Comment
Question by:Nusrat Nuriyev
  • 4
  • 2
6 Comments
 
LVL 94

Assisted Solution

by:John Hurst
John Hurst earned 500 total points
ID: 40609786
Simply, VPN passes TCP/IP packets that are encrypted. So the same rules apply at each end with regard to packets. The encryption is only in the tunnel.

Switches pass traffic at each end in a normal fashion.

I am not sure what an ISP knows about VPN. Generally VPN is independent of ISP, except that ISP's (and Hotels and like) can determine that VPN is being used (not see what is inside) and upcharge for it.

The VPN packets have header bytes that will say it is VPN and some of the characteristics of the overall packet.
0
 

Author Comment

by:Nusrat Nuriyev
ID: 40609987
Wait, you mean switch or routers?
Or the VPN scheme virtually may be like this?
office_1 <switch/router> ISP_1 <-> internet <-> ISP_2 <switch/router> office_2
Could you please explain what does mean tunnel?
0
 
LVL 94

Assisted Solution

by:John Hurst
John Hurst earned 500 total points
ID: 40609988
VPN forms an encrypted tunnel inside the middle internet portion . That is done to secure the data. The encapsulation is called a tunnel.
0
Netscaler Common Configuration How To guides

If you use NetScaler you will want to see these guides. The NetScaler How To Guides show administrators how to get NetScaler up and configured by providing instructions for common scenarios and some not so common ones.

 

Author Comment

by:Nusrat Nuriyev
ID: 40609996
So, up to ISP, it goes unencrypted? But how the ISP network equipment determine that it must be encrypted after it?

Does VPN technology form new packet and put the original TCP packet inside of the payload of new packet with new header?  Does VPN make an envelope with encrypted content on top of TCP packet?

Could we say that VPN is an just ecnrypts connection  and affects to all protocols on computers on both sides, comparing with HTTPS which secures only HTTP?
0
 
LVL 94

Accepted Solution

by:
John Hurst earned 500 total points
ID: 40610035
how the ISP network equipment determine that it must be encrypted after it?

The ISP has nothing to do with the encryption, encapsulation, or tunnel. That is up to the VPN (Virtual Private Network) hardware or software on each end.

Does VPN technology form new packet and put the original TCP packet inside <-- More or less, yes. and that is what isolates from the ISP.

VPN is not HTTPS at all. Apples and oranges.

The VPN encrypts at one end and unencrypts at the other end. The overall traffic is just TCP/IP.
0
 
LVL 94

Expert Comment

by:John Hurst
ID: 40610064
@Nusrat Nuriyev  - Thank you and I was happy to help. VPN (in the detail) is complicated. Good luck with your learning about it.
0

Featured Post

Free Tool: Path Explorer

An intuitive utility to help find the CSS path to UI elements on a webpage. These paths are used frequently in a variety of front-end development and QA automation tasks.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
DNS and NSLOOKUP 21 79
Routing protocols 5 20
EIGRP Bandwidth 9 21
Grant drive/folder change permissions to VPN user 6 15
OpenVPN is a great open source VPN server that is capable of providing quick and easy VPN access to your network on the cheap.  By default the software is configured to allow open access to your network.  But what if you want to restrict users to on…
Configuring network clients can be a chore, especially if there are a large number of them or a lot of itinerant users.  DHCP dynamically manages this process, much to the relief of users and administrators alike!
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

820 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question