190 likes | 613 Views
A Performance Analysis of Gateway-to-Gateway and End-to-Gateway L2TP VPN. Author: Rukhsana Rahim Butt. Abstract. L2TP Communication Modes behave differently on real and non-real applications. Detailed analysis for administrator is needed prior to VPN Mode deployment.
E N D
A Performance Analysis of Gateway-to-Gateway and End-to-Gateway L2TP VPN Author: Rukhsana Rahim Butt
Abstract • L2TP Communication Modes behave differently on real and non-real applications. • Detailed analysis for administrator is needed prior to VPN Mode deployment. • This study can be beneficial for • Financial growth. • Saving bandwidth. • Client satisfaction. COMSATS Institue of Information Technology
Paper Overview • Paper Goal • Provide basic understanding of communication Modes , current development and missing aspects/loopholes. • Effect of these technologies’ on various applications. • How these technologies fit together to provide today’s VPN solutions. • Approach • Simulation of L2TP Tunnel and measurement of capacity using OPNET COMSATS Institue of Information Technology
What and Why? COMSATS Institue of Information Technology
How L2TP/IPSec Secure WLAN? • Strong encryption, integrity, user authentication, replay protection, tunnel address assignment, multi-protocol and multi-vendor interoperability. • Mitigate attacks like • Wireless Packet Sniffer • Unauthorized Access • Network Topology Discovery • Password Attack COMSATS Institue of Information Technology
L2TP Communication Modes • Gateway-to-Gateway Mode • Compulsory Tunnel • End-to-Gateway Mode • Voluntary Tunnel COMSATS Institue of Information Technology
Voluntary Tunnel Vs Compulsory Tunnel COMSATS Institue of Information Technology
Current Information • General Tunnel Setup guideline • Security breaches against Tunnels • General Communication Mode Information COMSATS Institue of Information Technology
What is Missing? • Communication Modes’ Behavior vs. Applications • Analysis • Comparison • Suited Communication Mode against Applications (real & non-real) COMSATS Institue of Information Technology
Voice Received Traffic of Voluntary and Compulsory Tunnels (RFC 2764) COMSATS Institue of Information Technology
Voice Received Traffic of Voluntary and Compulsory Tunnels (RFC 2764) COMSATS Institue of Information Technology
Voice Throughput of Voluntary and Compulsory Tunnels (RFC 2764) COMSATS Institue of Information Technology
Requirements for Performance Analysis • High End-to-End Delay • Less Receiving Traffic Retrieved • Overall throughput decline on PPP and Tunnel links COMSATS Institue of Information Technology
Why Gateway-to-Gateway communication mode not suited for Voice Application? • Communication Mode is time-taken • High End-to-End Delay • Less Receiving Traffic • Tunnel Sharing • Less throughput on PPP Link • Less throughput on Tunnel Link COMSATS Institue of Information Technology
Conclusion The End-to-Gateway communication mode/ the Voluntary Tunnel of L2TP exposes better response in case of real applications. COMSATS Institue of Information Technology
Future Work Quantitative Analysis of Wireless LAN Security and Performance via VPN Technology L2TP/IPSec COMSATS Institue of Information Technology
Thanks Any Question ?