13.09.2014 Views

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

Local Area Networks (LANs) in Aircraft - FTP Directory Listing - FAA

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

VPN that is provided to the customer only appears to the customer to be a subnetwork<br />

(e.g., po<strong>in</strong>t-to-po<strong>in</strong>t wide area network (WAN) l<strong>in</strong>k, multipo<strong>in</strong>t LAN) with<strong>in</strong> the<br />

customer’s own network. L2VPNs can be created by physically leverag<strong>in</strong>g deployments<br />

of the service provider’s asynchronous transfer mode, frame relay, Ethernet<br />

encapsulation <strong>in</strong> IP, or multiprotocol label switch<strong>in</strong>g (MPLS, see RFC 2031) networks.<br />

• A Layer 3 Virtual Private Network (L3VPN) provides VPNs at the network layer (i.e., IP<br />

layer). In L3VPNs 20 , a network provider offers the customer a private network<br />

<strong>in</strong>frastructure via an IP layer service <strong>in</strong>terface (see figure 20). Consequently, the VPN<br />

that the service provider provides for the customer may be any IP topology hierarchy<br />

entity (e.g., subnetwork, area, AS, or network of networks). L3VPN networks that are<br />

designed for heightened security use IPSec’s (see RFC 4301) ESP (see RFC 4305) <strong>in</strong><br />

tunnel mode (e.g., see figure 21). Other technologies, <strong>in</strong> addition to IPsec, can be used to<br />

create other types of L3VPNs: BGP/MPLS, see RFC 2547 and reference 67), layer two<br />

tunnel<strong>in</strong>g protocol (see RFC 2661), IP/IP (see RFC 2003), and generic rout<strong>in</strong>g<br />

encapsulation (see RFC 2784).<br />

Figure 21 shows a Layer 3 VPN example. This specific example is an IPv4 network that is us<strong>in</strong>g<br />

IPsec <strong>in</strong> tunnel mode to create the VPN. Note that this figure is essentially the same as figure<br />

17, which showed how DoD COMSEC works <strong>in</strong> the DoD’s GIG network.<br />

RIPH<br />

RIPP<br />

ESP<br />

BIPH<br />

Red IP Header (Red = <strong>in</strong>ner IP layer = IP Layer used by the End Users)<br />

End user’s orig<strong>in</strong>al data payload<br />

IPsec ESP Header & Trailer<br />

Black IP Header (Black = outer IP layer)<br />

100.1.1.4<br />

100.1.1.1<br />

Workstation<br />

RIPHRIPPRIPP<br />

Dest<strong>in</strong>ation 100.1.6.1<br />

Source 100.1.1.4<br />

RIPH RIPP<br />

Dest<strong>in</strong>ation 100.1.6.1<br />

Source 100.1.1.4<br />

Workstation<br />

100.1.6.1<br />

100.1.3.1<br />

VPN<br />

Encapsulation<br />

200.1.1.1<br />

BIPH<br />

ESP<br />

RIPH<br />

RIPP<br />

ESP<br />

Dest<strong>in</strong>ation 200.1.4.1<br />

Source 200.1.1.1<br />

BIPH<br />

ESP<br />

RIPH<br />

RIPP<br />

ESP<br />

VPN<br />

Encapsulation<br />

200.1.4.1<br />

Black IP<br />

BIPH<br />

ESP<br />

RIPH RIPP<br />

ESP BIPH<br />

ESP<br />

RIPH<br />

RIPP<br />

ESP<br />

Black IP<br />

200.1.2.1 200.1.3.1<br />

Black<br />

“Service<br />

Mobile<br />

Provider”<br />

Intranet 1<br />

Network<br />

Figure 21. Example of VPN Encapsulation Us<strong>in</strong>g IPsec<br />

Service providers provide L3VPN services by encapsulat<strong>in</strong>g an extra IP layer to the customer’s<br />

IP layer protocol stack (see figure 22).<br />

20 See http://www.ietf.org/html.charters/l3vpn-charter.html<br />

68

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!