S 3.65 Introduction to basic VPN terminology

Initiation responsibility: IT Security Officer, Head of IT

Implementation responsibility: Administrator, IT Security Officer

A virtual private network (VPN) offers a secure communication channel between IT systems that is secured by access controls and the use of encryption. Selection and integration of suitable cryptographic procedures protect the integrity and confidentiality of the data transmitted. This also makes secure authentication possible for the communication partners when configured accordingly even when several networks or computers are connected to each other over leased lines or public networks.

A VPN can be established using almost any media available. VPNs may differ in terms of their implementation, the functions they offer, and in which layer of the ISO/OSI layer model they reside. It is necessary during the planning phase of a VPN to decide how the VPN will be operated later on and if an external service provider will be contracted to design and build it or operate it.

Typical VPN usage scenarios:

The following describes several operational scenarios VPNs are usually used in.

VPNs are often used to protect the communication of individual protocols and applications. For example, if the existing wireless LAN components do not support any form of secure encryption, all communication over the wireless LAN could be transmitted in encrypted form using a VPN that is independent of the wireless LAN. In this case, the signalisation and media transport of a VoIP connection could be bundled in a VPN tunnel and then encrypted.

VPN endpoint

The two basic types of VPN endpoints are VPN servers and VPN clients. The endpoint the connection is established to acts as the VPN server. The endpoint initiating the connection is referred to as the VPN client. VPN endpoints can be implemented in software or in hardware. In the case of field service employees, the VPN client generally consists of a software application running on a mobile IT system. Such a VPN client often intervenes strongly with the installed operating system. The parallel installation of several different VPN clients on a single device should be avoided for this reason. The connections forming the network between the individual VPN endpoints must be based on the results of the requirements analysis (S 2.415 Performing a VPN requirements analysis). The use of a secure authentication procedure must be ensured on the VPN endpoints as described in safeguard S 4.321 Secure operation of a VPN so that only authorised persons will be able to dial in to the VPN. Depending on the area of application, consideration could also be given to using an authentication server, for example a RADIUS server.

Selection of the communication relationships between the locations

If combining several different locations to form a LAN is planned, it is important to know between which locations the VPN connections will be established. The following topologies or combinations thereof are suitable for use when networking several locations:

A suitable network must be selected from these topologies or combinations thereof. To strike a compromise between reliability and cost, experience gained in practical applications has shown that it is best to use a topology with several central network access points and connect the individual locations to these central access points.

Types of VPNs

VPNs can be used to combine remote physical networks to form a logical network or to connect individual devices used in insecure networks to the central LAN using a protected channel. Depending on which systems are used at the endpoints of the VPN connection, such VPNs are referred to as site-to-site, end-to-end, or end-to-site VPNs.

Types of VPNs

The term VPN is often used as a synonym for encrypted connections. The different types of VPNs are often referred to by the VPN protocol used, for example TLS/SSLVPN or IPSec VPN. However, other methods can be used to secure the transport channel such as special functions provided by the transport protocol used, for example. There are also two basic types of VPNs: trusted VPNs and secure VPNs.

VPNs are referred to as trusted VPNs when the VPN connections between different locations are guaranteed by trusted external VPN service providers. In this case, the data is generally forwarded from the trusted network in unencrypted form to a gateway router of the provider using a dedicated communication channel. The VPN is formed by logically isolating the VPN data traffic from the rest of the data traffic (using multiprotocol label switching or MPLS, for example). For mobile users, service providers also provide VPNs using gateway routers only available through special dial-up nodes that are protected against unauthorised access.

If an external service provider is contracted to provide a trusted VPN, module S 1.11 Outsourcing should also be taken into account.

Trusted VPNs are not suitable for transmitting confidential data without additional encryption at the application layer, because the security of such connections lies completely in the hands of the VPN service provider. For example, a trusted VPN does not offer any protection against perpetrators working for the provider. It is therefore recommended to use a secure VPN for confidential data communications.

The dependency on third parties in terms of confidentiality can be avoided when communications are protected at the endpoints of the connection using encryption, in which case the VPN user is responsible for encryption. This solution is also referred to as a secure VPN.

A special form of trusted VPNs is if a dedicated line of the carrier is used to implement the VPN. In this case as well, it is necessary to protect confidential data before transmission using encryption, and the VPN user is again responsible for the encryption. Encryption can be performed on the VPN endpoints at the transport level (secure VPN) or at the application level.

VPN devices

A basic decision must be made as to whether the VPN product selected should be a dedicated VPN device, a combination device, or a software-based VPN solution running on standard IT systems (e.g. Linux with IPSec):

The advantages and disadvantages of the various designs are summarised and compared in the following table. An (x) indicates the design has the corresponding property, and a (-) indicates that it does not.

Property Dedicated VPN gateways Combination devices VPNs based on standard IT systems
(Self) protection of the VPN component - x -
High performance x - x
Low cost of acquisition - - x
Little time and effort until initial operation x x -
Simple administration x x -
Easy to expand - - x
Distribution of know-how x x -
Support from one source x x -

Table 1: Comparison of the various VPN designs

The entries in the table are derived from practical experience, and it will be necessary to verify if the product actually possesses the corresponding properties on a case-by-case basis.