Secure Overlay-Based Auto-configuration of Complex IPsec VPNs
نویسندگان
چکیده
However, growing VPN sizes and a dynamic behavior of VPN gateways and clients, e.g., for mobility reasons or perhaps reactions due to denial-of-service (DoS) attacks, make a manual configuration of large, dynamic VPN complicated and expensive. First, the administrative overhead is subject to a quadratic growth with the number of VPN devices, if each VPN device shall be able to communicate with every other VPN device. This will not only lead to higher expenses, but also to more errors introduced by human failure. Second, the robustness of the VPN is not as high as it could be, e.g., in case of partial failures of the transport network some VPN devices could redirect traffic for other devices that cannot reach each other directly anymore. Even though IPsec could support such a resilient behavior by utilizing nested security associations, manual reconfiguration prohibits a timely reaction. Third, manually configured security associations cannot be adopted with sufficient flexibility to support mobile VPNs appropriately. It is impossible to configure security associations between two mobile devices as both regularly change the IP addresses that they are reachable over.
منابع مشابه
Automatic Configuration of Complex IPsec-VPNs and Implications to Higher Layer Network Management
As the Internet emerges to be, not only the most important, but in many areas the only way of efficient communication, it becomes also vital for business and government institutions to securely exchange data via this medium. This led to the development of virtual private networks (VPNs). However, security in this aspect does not only refer to confidentiality, integrity, authentication, and acce...
متن کاملBehavioral and Performance Characteristics of IPsec/IKE in Large-Scale VPNs
Cryptographic network security services are essential for providing secure data communication over an insecure public network such as the Internet. Recently there has been tremendous growth in the requirements for, and use of, secure virtual private networks (VPNs) to interconnect enterprises with business partners, traveling staff, and remote office locations. Internet Protocol Security (IPsec...
متن کاملLimitations and Differences of using IPsec, TLS/SSL or SSH as VPN-solution
Virtual private networks (VPNs) [1] [6] provide low-cost and secure access between hosts and/or networks. IPsec, TLS/SSL and SSH are popular technologies used to create VPNs. This article will point out some of the differences and limitations of using IPsec, TLS/SSL or SSH as VPN-solution.
متن کاملDynamic and secure management of VPNs in IPv6 multi-domain scenarios
IPsec-based VPN solutions today run mainly in the IPv4 environment and it is important that they have the capability of being upgraded to IPv6 to remain interoperable in next generation Internet. Two of the key components of every VPN solution are the trust management system used to secure the VPN establishment process and the policy mechanism used to control the VPN life-cycle. However, these ...
متن کاملPerformance Analysis of IP Security VPN
Internet Protocol Security (IPSec) is a protocol suite for securing Internet Protocol (IP) communications by authenticating and encrypting each IP packet of a data stream. . IPSec architecture requires the host to provide confidentiality using Encapsulating Security Payload and data integrity using either Authentication Header or Encapsulating Security Payload and anti-replay protection. IPSec ...
متن کامل