Internet Protocol-based Virtual Private Networks
An IP VPN consists of a set of protocols that provides businesses with secure connections between locations – whether over the public Internet or across carriers’ private IP networks – that are shared by other users.
IP VPNs use comprehensive security measures to ensure the privacy and safe passage of business data, including encryption, encapsulation, authentication, and authorization. IP security protocol (IPSec), point-to-point tunneling protocol (PPTP), and Layer 2 tunneling protocol (L2TP) define various forms of encryption and authentication. Tunneling refers to methods of encapsulating a data packet within an IP packet. This allows the encapsulated packet, including its header, to be encrypted for security. Since the encapsulated packet need not be IP, tunneling supports multiprotocol traffic.
IP VPNs come in two basic varieties:
Customer premises equipment (CPE)-based IP VPNs and carrier network-based IP VPNs. Most CPE-based VPNs operate over the public Internet, using broadband or dedicated access lines and tunneling protocols to secure the data. The underlying IP network simply provides transport for VPN traffic. Available CPE ranges from small and home office hardware devices through high-speed routers with optical-speed connections. Carriers offer CPE-based IP VPNs as managed services, in which they install, manage, and maintain the CPE and set up and administer the VPN tunnels according to policies set by the customer.
In carrier network-hosted IP VPN services, the network is directly involved in the functioning of the IP VPN. Most service providers offer multiprotocol label switching (MPLS) IP VPNs, which allow them to keep customers’ private business traffic logically separated through the use of virtual circuit-like connections known as label switched paths (LSPs). This feature provides a level of security comparable to frame relay. The MPLS protocol is also designed to support traffic engineering, which the carrier can use to control individual “flows” of traffic over its network, in order to meet specific quality of service (QoS) performance requirements.