SlideShare a Scribd company logo
1 of 18
Download to read offline
Network Access
Layer Security
Protocols
Prof. Kirti Ahirrao 1
Index:
Network
access layer
security
protocols
• Layer 2 Forwarding protocol
• Point-to-pointTunneling Protocol
• Layer 2Tunneling Protocol
• Virtual private networking
Types of
Network
access layer
protocols
Prof. Kirti Ahirrao 2
Network access layer security
protocols
 The Network Access layer of the TCP/IP model corresponds with
the Data Link and Physical layers of the OSI reference model.
 It defines the protocols and hardware required to connect a host to
a physical network and to deliver data across it.
 Packets from the Internet layer are sent down the Network Access
layer for delivery within the physical network.
 The destination can be another host in the network, itself, or a
router for further forwarding.
 So the Internet layer has a view of the entire Internetwork whereas
the Network Access layer is limited to the physical layer boundary
that is often defined by a layer 3 device such as a router.
Prof. Kirti Ahirrao 3
Network access layer security
protocols
 It consists of a large number of protocols.
 When the physical network is a
LAN, Ethernet at its many variations are the
most common protocols used.
 On the other hand when the physical network
is a WAN, protocols such as the Point-to-
Point Protocol (PPP) and Frame Relay are
common.
Prof. Kirti Ahirrao 4
Network access layer security
protocols
Several protocols serve various functions at the Network Access layer,
including:
• Ethernet
• Wireless 802.11A, 802.11B, 802.11G and 802.11N
• FDDI
• ATM
• Frame Relay
• Pleisiosynchronous Digital Hierarchy (PDH)
• Synchronous Digital Hierarchy (SDH)
• OC3, OC12, OC48 etc.
Prof. Kirti Ahirrao 5
Layer 2 Forwarding(L2F)
Protocols:
 L2F stands for Layer 2 Forwarding.
 It is a media-independent tunneling protocol
developed by Cisco Systems.
 The Layer 2 Forwarding (L2F) protocol
tunnels data-link layer frames in such
protocols as Point-to-Point Protocol (PPP) or
Serial Line Internet Protocol (SLIP), making
it possible to create virtual private
networks (VPNs) over a public network such
as the Internet.
Prof. Kirti Ahirrao 6
Layer 2 Forwarding(L2F)
Protocols (working)
 When using PPP with L2F, e.g. PPP provides the connection
between a dial-up client and the network access server (NAS) that
receives the call.
 A PPP connection initiated by a client terminates at a NAS located
at a PPP service provider, usually an Internet service
provider (ISP).
 L2F allows the termination point of the connection to be extended
beyond the NAS to a remote destination node, so the client’s
connection appears to be directly to the remote node instead of to
the NAS.
 The function of the NAS in L2F is simply to project or forward
PPP frames from the client to the remote node.
 This remote node is called a home gateway in Cisco networking
terminology.
Prof. Kirti Ahirrao 7
Layer 2 Forwarding(L2F) Protocols -
(working)
 L2F has been largely superseded by the newer Layer 2 Tunneling
Protocol (L2TP), an Internet Engineering Task Force (IETF)
standard protocol that provides a vendor-neutral tunneling
solution.
 L2TP is an extension of the PPP protocol that supports the best
features of the Point-to-Point Tunneling Protocol (PPTP) and the
L2F protocol
Prof. Kirti Ahirrao 8
Point-to-Point
Protocol(PPP):
 Point-to-Point Protocol (PPP) is a Network
layer (layer 3) communications protocol, between
two routers directly without any host or any other
networking in between.
 It can provide connection authentication,
transmission encryption and compression.
 PPP is used over many types of physical networks
including serial cable, phone line, trunk line, cellular
telephone, specialized radio links, and fiber optic
links such as SONET.
 Internet service providers (ISPs) have used PPP for
customer dial-up access to the Internet, since IP
packets cannot be transmitted over a modem line on
their own, without some data link protocol that can
identify where the transmitted frame starts and where
it ends.
 Two derivatives of PPP, Point-to-Point Protocol over
Ethernet (PPPoE) and Point-to-Point Protocol over
ATM (PPPoA), are used most commonly by ISPs to
establish a digital subscriber line (DSL) Internet
service connection with customers.
Prof. Kirti Ahirrao 9
Point-to-Point
Protocol(PPP):
 PPP is a layered protocol that has three
components:
1.An encapsulation component that is used
to transmit datagrams over the
specified physical layer.
2.A Link Control Protocol (LCP) to
establish, configure, and test the link as
well as negotiate settings, options and the
use of features.
3.One or more Network Control Protocols
(NCP) used to negotiate optional
configuration parameters and facilities for
the network layer. There is one NCP for
each higher-layer protocol supported by
PPP.
Prof. Kirti Ahirrao 10
ARCHITECTURE
OFPOINT-TO-
POINT
PROTOCOL(PPP):
 LCP-Link Control Protocol
 CHAP-Challenge-Handshake
Authentication Protocol
 PAP-Password Authentication
Protocol
 EAP-Extensible Authentication
Protocol
 IPCP-Internet Protocol Control
Protocol
 IP-Internet Protocol
 HDLC-High-level Data Link Control
 PPPoE-Point-to-Point Protocol over
Ethernet
 PPPoA-Point-to-Point Protocol over
ATM
 POS-Packet over SONET/SDH
 RS-232-Recommended standards 232
 SONET/SDH-Synchronous Optical
NETworking/Synchronous Digital
Hierarchy
 Ethernet
 ATM-Asynchronous Transfer Mode
PROF. KIRTI AHIRRAO 11
Layer 2 Tunneling
Protocol(L2TP):
 It is a tunneling protocol used to
support virtual private
networks (VPNs) or as part of the
delivery of services by ISPs.
 It does not provide
any encryption or confidentiality
by itself.
 Rather, it relies on an encryption
protocol that it passes within the
tunnel to provide privacy.
Prof. Kirti Ahirrao 12
Bits 0–15 Bits 16–31
Flags and Version Info Length (opt)
Tunnel ID Session ID
Ns (opt) Nr (opt)
Offset Size (opt) Offset Pad (opt)......
Payload data
L2TP packet structure:
L2TP Packet Structure
 The two endpoints of an L2TP tunnel are called
the LAC (L2TP Access Concentrator) and the LNS (L2TP
Network Server).
 The LNS waits for new tunnels. Once a tunnel is established,
the network traffic between the peers is bidirectional.
 To be useful for networking, higher-level protocols are then
run through the L2TP tunnel.
 To facilitate this, an L2TP session (or 'call') is established
within the tunnel for each higher-level protocol such as PPP.
 Either the LAC or LNS may initiate sessions.
 The traffic for each session is isolated by L2TP, so it is
possible to set up multiple virtual networks across a single
tunnel. Maximum Transmission Unit (MTU) should be
considered when implementing L2TP.
 L2TP allows the creation of a virtual private dialup network
(VPDN) to connect a remote client to its corporate network
by using a shared infrastructure, which could be the Internet
or a service provider's network.
L2TP
(Working):
Prof. Kirti Ahirrao 13
 It extends a private network across a public network and enables users to send and
receive data across shared or public networks.
 As if their computing devices were directly connected to the private network.
 It was developed to provide access to corporate applications & resources to remote or
mobile users, and to branch offices.
 A VPN is created by establishing a virtual point-to-point connection through the use
of dedicated circuits or with tunneling protocols over existing networks.
 A VPN available from the public Internet can provide some of the benefits of a wide
area network (WAN).
 From a user perspective, the resources available within the private network can be
accessed remotely
Prof. Kirti Ahirrao 14
Virtual Private Network(VPN):
Virtual Private
Network(VPN):
The life cycle phases of an IPSec Tunnel in a virtual private
network.
Prof. Kirti Ahirrao 15
Virtual Private
Network(VPN):
A typical site-to-site VPN
Prof. Kirti Ahirrao 16
References:
 en.wikipedia.org/wiki
 networkencyclopedia.com
Prof. Kirti Ahirrao 17
THANKYOU
PROF. KIRTI AHIRRAO 18

More Related Content

What's hot (20)

Networking devices
Networking devicesNetworking devices
Networking devices
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
 
CCNA PPT
CCNA PPTCCNA PPT
CCNA PPT
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
IP Address
IP AddressIP Address
IP Address
 
network Switch
 network Switch network Switch
network Switch
 
MPLS VPN
MPLS VPNMPLS VPN
MPLS VPN
 
Resource reservation protocol
Resource reservation protocolResource reservation protocol
Resource reservation protocol
 
TCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet ProtocolTCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet Protocol
 
Vpn presentation
Vpn presentationVpn presentation
Vpn presentation
 
Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)Dynamic routing protocols (CCNA)
Dynamic routing protocols (CCNA)
 
08 multiplexing
08 multiplexing08 multiplexing
08 multiplexing
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Dynamic NAT
Dynamic NATDynamic NAT
Dynamic NAT
 
Ch 19 Network-layer protocols Section 1
Ch 19  Network-layer protocols Section 1Ch 19  Network-layer protocols Section 1
Ch 19 Network-layer protocols Section 1
 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
 
Unit 4
Unit 4Unit 4
Unit 4
 
Integrated service digital network
Integrated service digital networkIntegrated service digital network
Integrated service digital network
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
IP Subnetting
IP SubnettingIP Subnetting
IP Subnetting
 

Similar to Network access layer security protocol

Similar to Network access layer security protocol (20)

F0322038042
F0322038042F0322038042
F0322038042
 
Review on Protocols of Virtual Private Network
Review on Protocols of Virtual Private NetworkReview on Protocols of Virtual Private Network
Review on Protocols of Virtual Private Network
 
Mcse question
Mcse questionMcse question
Mcse question
 
V P N
V P NV P N
V P N
 
ETE405-lec7.pptx
ETE405-lec7.pptxETE405-lec7.pptx
ETE405-lec7.pptx
 
ETE405-lec7.ppt
ETE405-lec7.pptETE405-lec7.ppt
ETE405-lec7.ppt
 
Vpn protocols
Vpn protocolsVpn protocols
Vpn protocols
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
 
Protocols in computer network
Protocols in computer network   Protocols in computer network
Protocols in computer network
 
Networking questions
Networking questionsNetworking questions
Networking questions
 
NETWORK DEVICE SECURITY NETWORK HARDENING
NETWORK DEVICE SECURITY NETWORK HARDENINGNETWORK DEVICE SECURITY NETWORK HARDENING
NETWORK DEVICE SECURITY NETWORK HARDENING
 
Netw204 Quiz Answers Essay
Netw204 Quiz Answers EssayNetw204 Quiz Answers Essay
Netw204 Quiz Answers Essay
 
Networks faq
Networks faqNetworks faq
Networks faq
 
Firewall
FirewallFirewall
Firewall
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Module 1.pptx
Module 1.pptxModule 1.pptx
Module 1.pptx
 
Vpn
VpnVpn
Vpn
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
Virtual private networks (vpn)
Virtual private networks (vpn)Virtual private networks (vpn)
Virtual private networks (vpn)
 
Vp ns
Vp nsVp ns
Vp ns
 

More from Kirti Ahirrao

Application layer security protocol
Application layer security protocolApplication layer security protocol
Application layer security protocolKirti Ahirrao
 
Internet layer security protocol & IPsec
Internet layer security protocol & IPsecInternet layer security protocol & IPsec
Internet layer security protocol & IPsecKirti Ahirrao
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Kirti Ahirrao
 

More from Kirti Ahirrao (6)

BusTopolgy.pptx
BusTopolgy.pptxBusTopolgy.pptx
BusTopolgy.pptx
 
Attack on Sony
Attack on SonyAttack on Sony
Attack on Sony
 
Firewall traversals
Firewall traversalsFirewall traversals
Firewall traversals
 
Application layer security protocol
Application layer security protocolApplication layer security protocol
Application layer security protocol
 
Internet layer security protocol & IPsec
Internet layer security protocol & IPsecInternet layer security protocol & IPsec
Internet layer security protocol & IPsec
 
Chapter 1 introduction(web security)
Chapter 1 introduction(web security)Chapter 1 introduction(web security)
Chapter 1 introduction(web security)
 

Recently uploaded

REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxDr. Ravikiran H M Gowda
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Pooja Bhuva
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxEsquimalt MFRC
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxCeline George
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...Nguyen Thanh Tu Collection
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.MaryamAhmad92
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Pooja Bhuva
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsMebane Rash
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseAnaAcapella
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxmarlenawright1
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptxMaritesTamaniVerdade
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibitjbellavia9
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxVishalSingh1417
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfSherif Taha
 

Recently uploaded (20)

Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
REMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptxREMIFENTANIL: An Ultra short acting opioid.pptx
REMIFENTANIL: An Ultra short acting opioid.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Unit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptxUnit-V; Pricing (Pharma Marketing Management).pptx
Unit-V; Pricing (Pharma Marketing Management).pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 

Network access layer security protocol

  • 2. Index: Network access layer security protocols • Layer 2 Forwarding protocol • Point-to-pointTunneling Protocol • Layer 2Tunneling Protocol • Virtual private networking Types of Network access layer protocols Prof. Kirti Ahirrao 2
  • 3. Network access layer security protocols  The Network Access layer of the TCP/IP model corresponds with the Data Link and Physical layers of the OSI reference model.  It defines the protocols and hardware required to connect a host to a physical network and to deliver data across it.  Packets from the Internet layer are sent down the Network Access layer for delivery within the physical network.  The destination can be another host in the network, itself, or a router for further forwarding.  So the Internet layer has a view of the entire Internetwork whereas the Network Access layer is limited to the physical layer boundary that is often defined by a layer 3 device such as a router. Prof. Kirti Ahirrao 3
  • 4. Network access layer security protocols  It consists of a large number of protocols.  When the physical network is a LAN, Ethernet at its many variations are the most common protocols used.  On the other hand when the physical network is a WAN, protocols such as the Point-to- Point Protocol (PPP) and Frame Relay are common. Prof. Kirti Ahirrao 4
  • 5. Network access layer security protocols Several protocols serve various functions at the Network Access layer, including: • Ethernet • Wireless 802.11A, 802.11B, 802.11G and 802.11N • FDDI • ATM • Frame Relay • Pleisiosynchronous Digital Hierarchy (PDH) • Synchronous Digital Hierarchy (SDH) • OC3, OC12, OC48 etc. Prof. Kirti Ahirrao 5
  • 6. Layer 2 Forwarding(L2F) Protocols:  L2F stands for Layer 2 Forwarding.  It is a media-independent tunneling protocol developed by Cisco Systems.  The Layer 2 Forwarding (L2F) protocol tunnels data-link layer frames in such protocols as Point-to-Point Protocol (PPP) or Serial Line Internet Protocol (SLIP), making it possible to create virtual private networks (VPNs) over a public network such as the Internet. Prof. Kirti Ahirrao 6
  • 7. Layer 2 Forwarding(L2F) Protocols (working)  When using PPP with L2F, e.g. PPP provides the connection between a dial-up client and the network access server (NAS) that receives the call.  A PPP connection initiated by a client terminates at a NAS located at a PPP service provider, usually an Internet service provider (ISP).  L2F allows the termination point of the connection to be extended beyond the NAS to a remote destination node, so the client’s connection appears to be directly to the remote node instead of to the NAS.  The function of the NAS in L2F is simply to project or forward PPP frames from the client to the remote node.  This remote node is called a home gateway in Cisco networking terminology. Prof. Kirti Ahirrao 7
  • 8. Layer 2 Forwarding(L2F) Protocols - (working)  L2F has been largely superseded by the newer Layer 2 Tunneling Protocol (L2TP), an Internet Engineering Task Force (IETF) standard protocol that provides a vendor-neutral tunneling solution.  L2TP is an extension of the PPP protocol that supports the best features of the Point-to-Point Tunneling Protocol (PPTP) and the L2F protocol Prof. Kirti Ahirrao 8
  • 9. Point-to-Point Protocol(PPP):  Point-to-Point Protocol (PPP) is a Network layer (layer 3) communications protocol, between two routers directly without any host or any other networking in between.  It can provide connection authentication, transmission encryption and compression.  PPP is used over many types of physical networks including serial cable, phone line, trunk line, cellular telephone, specialized radio links, and fiber optic links such as SONET.  Internet service providers (ISPs) have used PPP for customer dial-up access to the Internet, since IP packets cannot be transmitted over a modem line on their own, without some data link protocol that can identify where the transmitted frame starts and where it ends.  Two derivatives of PPP, Point-to-Point Protocol over Ethernet (PPPoE) and Point-to-Point Protocol over ATM (PPPoA), are used most commonly by ISPs to establish a digital subscriber line (DSL) Internet service connection with customers. Prof. Kirti Ahirrao 9
  • 10. Point-to-Point Protocol(PPP):  PPP is a layered protocol that has three components: 1.An encapsulation component that is used to transmit datagrams over the specified physical layer. 2.A Link Control Protocol (LCP) to establish, configure, and test the link as well as negotiate settings, options and the use of features. 3.One or more Network Control Protocols (NCP) used to negotiate optional configuration parameters and facilities for the network layer. There is one NCP for each higher-layer protocol supported by PPP. Prof. Kirti Ahirrao 10
  • 11. ARCHITECTURE OFPOINT-TO- POINT PROTOCOL(PPP):  LCP-Link Control Protocol  CHAP-Challenge-Handshake Authentication Protocol  PAP-Password Authentication Protocol  EAP-Extensible Authentication Protocol  IPCP-Internet Protocol Control Protocol  IP-Internet Protocol  HDLC-High-level Data Link Control  PPPoE-Point-to-Point Protocol over Ethernet  PPPoA-Point-to-Point Protocol over ATM  POS-Packet over SONET/SDH  RS-232-Recommended standards 232  SONET/SDH-Synchronous Optical NETworking/Synchronous Digital Hierarchy  Ethernet  ATM-Asynchronous Transfer Mode PROF. KIRTI AHIRRAO 11
  • 12. Layer 2 Tunneling Protocol(L2TP):  It is a tunneling protocol used to support virtual private networks (VPNs) or as part of the delivery of services by ISPs.  It does not provide any encryption or confidentiality by itself.  Rather, it relies on an encryption protocol that it passes within the tunnel to provide privacy. Prof. Kirti Ahirrao 12 Bits 0–15 Bits 16–31 Flags and Version Info Length (opt) Tunnel ID Session ID Ns (opt) Nr (opt) Offset Size (opt) Offset Pad (opt)...... Payload data L2TP packet structure: L2TP Packet Structure
  • 13.  The two endpoints of an L2TP tunnel are called the LAC (L2TP Access Concentrator) and the LNS (L2TP Network Server).  The LNS waits for new tunnels. Once a tunnel is established, the network traffic between the peers is bidirectional.  To be useful for networking, higher-level protocols are then run through the L2TP tunnel.  To facilitate this, an L2TP session (or 'call') is established within the tunnel for each higher-level protocol such as PPP.  Either the LAC or LNS may initiate sessions.  The traffic for each session is isolated by L2TP, so it is possible to set up multiple virtual networks across a single tunnel. Maximum Transmission Unit (MTU) should be considered when implementing L2TP.  L2TP allows the creation of a virtual private dialup network (VPDN) to connect a remote client to its corporate network by using a shared infrastructure, which could be the Internet or a service provider's network. L2TP (Working): Prof. Kirti Ahirrao 13
  • 14.  It extends a private network across a public network and enables users to send and receive data across shared or public networks.  As if their computing devices were directly connected to the private network.  It was developed to provide access to corporate applications & resources to remote or mobile users, and to branch offices.  A VPN is created by establishing a virtual point-to-point connection through the use of dedicated circuits or with tunneling protocols over existing networks.  A VPN available from the public Internet can provide some of the benefits of a wide area network (WAN).  From a user perspective, the resources available within the private network can be accessed remotely Prof. Kirti Ahirrao 14 Virtual Private Network(VPN):
  • 15. Virtual Private Network(VPN): The life cycle phases of an IPSec Tunnel in a virtual private network. Prof. Kirti Ahirrao 15
  • 16. Virtual Private Network(VPN): A typical site-to-site VPN Prof. Kirti Ahirrao 16