Solved

Digging into VPN. How ISP determines that it's Remote access VPN traffic?

Posted on 2015-02-14
6
103 Views
Last Modified: 2015-02-14
How ISP determines that it's Remote Access VPN traffic?
What about network protocols which are used for VPN?
What about roles of switches on VPN.
0
Comment
Question by:Nusrat Nuriyev
  • 4
  • 2
6 Comments
 
LVL 90

Assisted Solution

by:John Hurst
John Hurst earned 500 total points
Comment Utility
Simply, VPN passes TCP/IP packets that are encrypted. So the same rules apply at each end with regard to packets. The encryption is only in the tunnel.

Switches pass traffic at each end in a normal fashion.

I am not sure what an ISP knows about VPN. Generally VPN is independent of ISP, except that ISP's (and Hotels and like) can determine that VPN is being used (not see what is inside) and upcharge for it.

The VPN packets have header bytes that will say it is VPN and some of the characteristics of the overall packet.
0
 

Author Comment

by:Nusrat Nuriyev
Comment Utility
Wait, you mean switch or routers?
Or the VPN scheme virtually may be like this?
office_1 <switch/router> ISP_1 <-> internet <-> ISP_2 <switch/router> office_2
Could you please explain what does mean tunnel?
0
 
LVL 90

Assisted Solution

by:John Hurst
John Hurst earned 500 total points
Comment Utility
VPN forms an encrypted tunnel inside the middle internet portion . That is done to secure the data. The encapsulation is called a tunnel.
0
Maximize Your Threat Intelligence Reporting

Reporting is one of the most important and least talked about aspects of a world-class threat intelligence program. Here’s how to do it right.

 

Author Comment

by:Nusrat Nuriyev
Comment Utility
So, up to ISP, it goes unencrypted? But how the ISP network equipment determine that it must be encrypted after it?

Does VPN technology form new packet and put the original TCP packet inside of the payload of new packet with new header?  Does VPN make an envelope with encrypted content on top of TCP packet?

Could we say that VPN is an just ecnrypts connection  and affects to all protocols on computers on both sides, comparing with HTTPS which secures only HTTP?
0
 
LVL 90

Accepted Solution

by:
John Hurst earned 500 total points
Comment Utility
how the ISP network equipment determine that it must be encrypted after it?

The ISP has nothing to do with the encryption, encapsulation, or tunnel. That is up to the VPN (Virtual Private Network) hardware or software on each end.

Does VPN technology form new packet and put the original TCP packet inside <-- More or less, yes. and that is what isolates from the ISP.

VPN is not HTTPS at all. Apples and oranges.

The VPN encrypts at one end and unencrypts at the other end. The overall traffic is just TCP/IP.
0
 
LVL 90

Expert Comment

by:John Hurst
Comment Utility
@Nusrat Nuriyev  - Thank you and I was happy to help. VPN (in the detail) is complicated. Good luck with your learning about it.
0

Featured Post

Threat Intelligence Starter Resources

Integrating threat intelligence can be challenging, and not all companies are ready. These resources can help you build awareness and prepare for defense.

Join & Write a Comment

For a while, I have wanted to connect my HTC Incredible to my corporate network to take advantage of the phone's powerful capabilities. I searched online and came up with varied answers from "it won't work" to super complicated statements that I did…
Configuring network clients can be a chore, especially if there are a large number of them or a lot of itinerant users.  DHCP dynamically manages this process, much to the relief of users and administrators alike!
Viewers will learn how to properly install and use Secure Shell (SSH) to work on projects or homework remotely. Download Secure Shell: Follow basic installation instructions: Open Secure Shell and use "Quick Connect" to enter credentials includi…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now