SlideShare a Scribd company logo
1 of 7
Juniper SSL VPN Strategy, architecture and introduction
IPsec VPN Full Tunnel IPsec VPN Originally designed for inter-communication over non-secure networks (ie, the internet) Each endpoint (software or hardware) consumes full GRE resources All traffic routed to the VPN is passed as IP traffic: applications typically do not need to be customized to work over a VPN Notable exceptions: multicast traffic, NAT’d client traffic (ESP in transport mode or IPsec authentication headers) Operates in tunnel or transport mode Tunnel encapsulates the full packet including src.ip, dst.ipetc, and rewrites this with a new header Transport mode only encrypts the payload of the packet, leaving all source IP address information in cleartext
SSL VPN Full/Split Tunnel SSL VPN Operates at the Transport Layer of the network protocol stack, encapsulating application-specific protocols such as HTTP, FTP, SMTP Often requires applications to be rewritten or extended in order to make native use Luckily, most web browsers include SSL libraries/most applications  Requires no software installation or configuration for clients Never functions as a site to site tunnel, Non-resource intensive
IPsec Packet Flows
SSL VPN Packet Flows
Resource wise, all GRE tunnels are equivalent =

More Related Content

Viewers also liked

Configuring the cisco switch with the cli based setup program
Configuring the cisco switch with the cli based setup programConfiguring the cisco switch with the cli based setup program
Configuring the cisco switch with the cli based setup program3Anetwork com
 
Cisco 1921 vs. cisco 1941 vs. cisco 1941 w
Cisco 1921 vs. cisco 1941 vs. cisco 1941 wCisco 1921 vs. cisco 1941 vs. cisco 1941 w
Cisco 1921 vs. cisco 1941 vs. cisco 1941 wIT Tech
 
300 101 Dumps - Implementing Cisco IP Routing
300 101 Dumps - Implementing Cisco IP Routing300 101 Dumps - Implementing Cisco IP Routing
300 101 Dumps - Implementing Cisco IP RoutingSara Rock
 
Site to Site VPN CISCO ASA
Site to Site VPN CISCO ASASite to Site VPN CISCO ASA
Site to Site VPN CISCO ASARahul E
 
Ubuntu SSL VPN
Ubuntu SSL VPNUbuntu SSL VPN
Ubuntu SSL VPNsharetech
 
Network Service in OpenStack Cloud, by Yaohui Jin
Network Service in OpenStack Cloud, by Yaohui JinNetwork Service in OpenStack Cloud, by Yaohui Jin
Network Service in OpenStack Cloud, by Yaohui JinHui Cheng
 
Forti Gate Ssl Vpn User Guide 01 30007 0348 20080718
Forti Gate Ssl Vpn User Guide 01 30007 0348 20080718Forti Gate Ssl Vpn User Guide 01 30007 0348 20080718
Forti Gate Ssl Vpn User Guide 01 30007 0348 20080718guest75224e4
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPNAjay Nawani
 
Qu’est-ce qu’un poste de travail sécurisé ?
Qu’est-ce qu’un poste de travail sécurisé ? Qu’est-ce qu’un poste de travail sécurisé ?
Qu’est-ce qu’un poste de travail sécurisé ? Microsoft Technet France
 
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]APNIC
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpnjadeja dhanraj
 
05 01 open-vpn
05 01 open-vpn05 01 open-vpn
05 01 open-vpnNoël
 

Viewers also liked (14)

Configuring the cisco switch with the cli based setup program
Configuring the cisco switch with the cli based setup programConfiguring the cisco switch with the cli based setup program
Configuring the cisco switch with the cli based setup program
 
Cisco 1921 vs. cisco 1941 vs. cisco 1941 w
Cisco 1921 vs. cisco 1941 vs. cisco 1941 wCisco 1921 vs. cisco 1941 vs. cisco 1941 w
Cisco 1921 vs. cisco 1941 vs. cisco 1941 w
 
300 101 Dumps - Implementing Cisco IP Routing
300 101 Dumps - Implementing Cisco IP Routing300 101 Dumps - Implementing Cisco IP Routing
300 101 Dumps - Implementing Cisco IP Routing
 
Site to Site VPN CISCO ASA
Site to Site VPN CISCO ASASite to Site VPN CISCO ASA
Site to Site VPN CISCO ASA
 
Ubuntu SSL VPN
Ubuntu SSL VPNUbuntu SSL VPN
Ubuntu SSL VPN
 
Vpn 3
Vpn 3Vpn 3
Vpn 3
 
Network Service in OpenStack Cloud, by Yaohui Jin
Network Service in OpenStack Cloud, by Yaohui JinNetwork Service in OpenStack Cloud, by Yaohui Jin
Network Service in OpenStack Cloud, by Yaohui Jin
 
Forti Gate Ssl Vpn User Guide 01 30007 0348 20080718
Forti Gate Ssl Vpn User Guide 01 30007 0348 20080718Forti Gate Ssl Vpn User Guide 01 30007 0348 20080718
Forti Gate Ssl Vpn User Guide 01 30007 0348 20080718
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 
Qu’est-ce qu’un poste de travail sécurisé ?
Qu’est-ce qu’un poste de travail sécurisé ? Qu’est-ce qu’un poste de travail sécurisé ?
Qu’est-ce qu’un poste de travail sécurisé ?
 
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
MPLS L3 VPN Tutorial, by Nurul Islam Roman [APNIC 38]
 
my presentation on vpn
my presentation on vpnmy presentation on vpn
my presentation on vpn
 
05 01 open-vpn
05 01 open-vpn05 01 open-vpn
05 01 open-vpn
 
Spring Ldap
Spring LdapSpring Ldap
Spring Ldap
 

Juniper SSL VPN introduction

  • 1. Juniper SSL VPN Strategy, architecture and introduction
  • 2. IPsec VPN Full Tunnel IPsec VPN Originally designed for inter-communication over non-secure networks (ie, the internet) Each endpoint (software or hardware) consumes full GRE resources All traffic routed to the VPN is passed as IP traffic: applications typically do not need to be customized to work over a VPN Notable exceptions: multicast traffic, NAT’d client traffic (ESP in transport mode or IPsec authentication headers) Operates in tunnel or transport mode Tunnel encapsulates the full packet including src.ip, dst.ipetc, and rewrites this with a new header Transport mode only encrypts the payload of the packet, leaving all source IP address information in cleartext
  • 3. SSL VPN Full/Split Tunnel SSL VPN Operates at the Transport Layer of the network protocol stack, encapsulating application-specific protocols such as HTTP, FTP, SMTP Often requires applications to be rewritten or extended in order to make native use Luckily, most web browsers include SSL libraries/most applications Requires no software installation or configuration for clients Never functions as a site to site tunnel, Non-resource intensive
  • 5.
  • 7. Resource wise, all GRE tunnels are equivalent =

Editor's Notes

  1. GRE: Generic Routing EncapsulationESP: Encapsulating Security PayloadAH: authentication headers