Chapter 6. Virtual Private Networks
Organizations with several satellite offices often connect to each
other with dedicated lines for efficiency and protection of sensitive data
in transit. For example, many businesses use frame relay or
Asynchronous Transfer Mode (ATM) lines as an
end-to-end networking solution to link one office with others. This can be
an expensive proposition, especially for small to medium sized businesses
(SMBs) that want to expand without paying the high costs associated with
enterprise-level, dedicated digital circuits.
To address this need, Virtual Private Networks
(VPNs) were developed. Following the same functional
principles as dedicated circuits, VPNs allow for secured digital
communication between two parties (or networks), creating a Wide Area
Network (WAN) from existing Local Area Networks
(LANs). Where it differs from frame relay or ATM is in
its transport medium. VPNs transmit over IP using datagrams as the
transport layer, making it a secure conduit through the Internet to an
intended destination. Most free software VPN implementations incorporate
open standard encryption methods to further mask data in transit.
Some organizations employ hardware VPN solutions to augment security,
while others use the software or protocol-based implementations. There are
several vendors with hardware VPN solutions such as Cisco, Nortel, IBM,
and Checkpoint. There is a free software-based VPN solution for Linux
called FreeS/Wan that utilizes a standardized IPsec
(or Internet Protocol Security) implementation. These VPN solutions,
regardless if hardware or software based, act as specialized routers that
sit between the IP connection from one office to another.
When a packet is transmitted from a client, it sends it through the
router or gateway, which then adds header information for routing and
authentication called the Authentication Header
(AH). The data is encrypted and is enclosed with
decryption and handling instruction called the Encapsulating
Security Payload (ESP). The receiving VPN
router strips the header information, decrypts the data, and routes it to
its intended destination (either a workstation or node on a
network). Using a network-to-network connection, the receiving node on the
local network receives the packets decrypted and ready for processing. The
encryption/decryption process in a network-to-network VPN connection is
transparent to a local node.
With such a heightened level of security, a cracker must not only
intercept a packet, but decrypt the packet as well. Intruders who employ a
man-in-the-middle attack between a server and client must also have access
to at least one of the private keys for authenticating sessions. Because
they employ several layers of authentication and encryption, VPNs are a
secure and effective means to connect multiple remote nodes to act as a
unified Intranet.
Red Hat Enterprise Linux users have various options in terms of implementing a
software solution to securely connect to their WAN. Internet
Protocol Security, or IPsec is the
supported VPN implementation for Red Hat Enterprise Linux that sufficiently addresses the
usability needs of organizations with branch offices or remote users.