Download
a performance analysis of gateway to gateway and end to gateway l2tp vpn n.
Skip this Video
Loading SlideShow in 5 Seconds..
A Performance Analysis of Gateway-to-Gateway and End-to-Gateway L2TP VPN PowerPoint Presentation
Download Presentation
A Performance Analysis of Gateway-to-Gateway and End-to-Gateway L2TP VPN

A Performance Analysis of Gateway-to-Gateway and End-to-Gateway L2TP VPN

272 Views Download Presentation
Download Presentation

A Performance Analysis of Gateway-to-Gateway and End-to-Gateway L2TP VPN

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. A Performance Analysis of Gateway-to-Gateway and End-to-Gateway L2TP VPN Author: Rukhsana Rahim Butt

  2. Abstract • L2TP Communication Modes behave differently on real and non-real applications. • Detailed analysis for administrator is needed prior to VPN Mode deployment. • This study can be beneficial for • Financial growth. • Saving bandwidth. • Client satisfaction. COMSATS Institue of Information Technology

  3. Paper Overview • Paper Goal • Provide basic understanding of communication Modes , current development and missing aspects/loopholes. • Effect of these technologies’ on various applications. • How these technologies fit together to provide today’s VPN solutions. • Approach • Simulation of L2TP Tunnel and measurement of capacity using OPNET COMSATS Institue of Information Technology

  4. What and Why? COMSATS Institue of Information Technology

  5. How L2TP/IPSec Secure WLAN? • Strong encryption, integrity, user authentication, replay protection, tunnel address assignment, multi-protocol and multi-vendor interoperability. • Mitigate attacks like • Wireless Packet Sniffer • Unauthorized Access • Network Topology Discovery • Password Attack COMSATS Institue of Information Technology

  6. L2TP Communication Modes • Gateway-to-Gateway Mode • Compulsory Tunnel • End-to-Gateway Mode • Voluntary Tunnel COMSATS Institue of Information Technology

  7. Voluntary Tunnel Vs Compulsory Tunnel COMSATS Institue of Information Technology

  8. Current Information • General Tunnel Setup guideline • Security breaches against Tunnels • General Communication Mode Information COMSATS Institue of Information Technology

  9. What is Missing? • Communication Modes’ Behavior vs. Applications • Analysis • Comparison • Suited Communication Mode against Applications (real & non-real) COMSATS Institue of Information Technology

  10. Voice Received Traffic of Voluntary and Compulsory Tunnels (RFC 2764) COMSATS Institue of Information Technology

  11. Voice Received Traffic of Voluntary and Compulsory Tunnels (RFC 2764) COMSATS Institue of Information Technology

  12. Voice Throughput of Voluntary and Compulsory Tunnels (RFC 2764) COMSATS Institue of Information Technology

  13. Requirements for Performance Analysis • High End-to-End Delay • Less Receiving Traffic Retrieved • Overall throughput decline on PPP and Tunnel links COMSATS Institue of Information Technology

  14. Why Gateway-to-Gateway communication mode not suited for Voice Application? • Communication Mode is time-taken • High End-to-End Delay • Less Receiving Traffic • Tunnel Sharing • Less throughput on PPP Link • Less throughput on Tunnel Link COMSATS Institue of Information Technology

  15. Conclusion The End-to-Gateway communication mode/ the Voluntary Tunnel of L2TP exposes better response in case of real applications. COMSATS Institue of Information Technology

  16. Future Work Quantitative Analysis of Wireless LAN Security and Performance via VPN Technology L2TP/IPSec COMSATS Institue of Information Technology

  17. Thanks Any Question ?