Presentation is loading. Please wait.

Presentation is loading. Please wait.

Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential -2--2- “ If saving money is wrong, I don’t want.

Similar presentations


Presentation on theme: "Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential -2--2- “ If saving money is wrong, I don’t want."— Presentation transcript:

1 Virtual Private Network (VPN)

2 ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential -2--2- “ If saving money is wrong, I don’t want to be right…” “ If saving money is wrong, I don’t want to be right…” - William Shartner

3 ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential -3--3- outline What is a VPN? What is a VPN?  Types of VPN  Why use VPNs?  Disadvantage of VPN  Types of VPN protocols  Encryption

4 ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential -4--4- What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and encryption to protect data integrity and confidentiality A VPN includes authentication and encryption to protect data integrity and confidentiality VPN Internet

5 ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential -5--5- Types of VPNs Remote Access VPN Remote Access VPN  Provides access to internal corporate network over the Internet.  Reduces long distance, modem bank, and technical support costs. Internet Corporate Site

6 ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential -6--6- Types of VPNs Remote Access VPN Remote Access VPN Site-to-Site VPN Site-to-Site VPN  Connects multiple offices over Internet  Reduces dependencies on frame relay and leased lines Internet Branch Office Corporate Site

7 ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential -7--7- Types of VPNs Remote Access VPN Remote Access VPN Site-to-Site VPN Site-to-Site VPN  Extranet VPN  Provides business partners access to critical information (leads, sales tools, etc)  Reduces transaction and operational costs Corporate Site Internet Partner #1 Partner #2

8 ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential -8--8- Types of VPNs Remote Access VPN Remote Access VPN Site-to-Site VPN Site-to-Site VPN  Extranet VPN  Intranet VPN: Links corporate headquarters, remote offices, and branch offices over a shared infrastructure using dedicated connections. Links corporate headquarters, remote offices, and branch offices over a shared infrastructure using dedicated connections. Internet LAN clients Database Server LAN clients with sensitive data

9 ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential -9--9- Why Use Virtual Private Networks? More flexibility More flexibility  Use multiple connection types (cable, DSL, T1, T3)  Secure and low-cost way to link  Ubiquitous ISP services  Easier E-commerce

10 ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential -10- Why Use Virtual Private Networks? More flexibility More flexibility More scalability More scalability  Add new sites, users quickly  Scale bandwidth to meet demand

11 ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential -11- Why Use Virtual Private Networks? More flexibility More flexibility More scalability More scalability Lower costs Lower costs  Reduced frame relay/leased line costs  Reduced long distance  Reduced equipment costs (modem banks,CSU/DSUs)  Reduced technical training and support

12 ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential -12- VPN Return on Investment 5 branch offices, 1 large corporate office, 200 remote access users. Payback: 1.04 months. Annual Savings: 88% Check Point VPN Solution Non-VPN Solution Savings with Check Point Startup Costs (Hardware and Software) $51,965 Existing; sunk costs = $0 Site-to-Site Annual Cost $30,485$71,664 Frame relay $41,180 /yr RAS Annual Cost $48,000$604,800 Dial-in costs $556,800 /yr Combined Annual Cost $78,485$676,464 $597,980 /yr Case History – Professional Services Company

13 ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential -13- Disadvantages of VPN Lower bandwidth available compared to dial-in line Lower bandwidth available compared to dial-in line Inconsistent remote access performance due to changes in Internet connectivity Inconsistent remote access performance due to changes in Internet connectivity No entrance into the network if the Internet connection is broken No entrance into the network if the Internet connection is broken

14 ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential -14- Point-to-Point Tunneling Protocol (PPTP) Layer 2 remote access VPN distributed with Windows product family Layer 2 remote access VPN distributed with Windows product family  Addition to Point-to-Point Protocol (PPP)  Allows multiple Layer 3 Protocols Uses proprietary authentication and encryption Uses proprietary authentication and encryption Limited user management and scalability Limited user management and scalability  Used MPPE encryption method Internet Remote PPTP Client ISP Remote Access Switch PPTP RAS Server Corporate Network

15 ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential -15- Layer 2 Tunneling Protocol (L2TP) Layer 2 remote access VPN protocol Layer 2 remote access VPN protocol  Combines and extends PPTP and L2F (Cisco supported protocol)  Weak authentication and encryption  Addition to Point-to-Point Protocol (PPP)  Must be combined with IPSec for enterprise-level security Internet Remote L2TP Client ISP L2TP Concentrator L2TP Server Corporate Network

16 ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential -16- Internet Protocol Security (IPSec) Layer 3 protocol for remote access, intranet, and extranet VPNs Layer 3 protocol for remote access, intranet, and extranet VPNs  Internet standard for VPNs  Provides flexible encryption and message authentication/integrity

17 ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential -17- Encryption Used to convert data to a secret code for transmission over an trusted network Used to convert data to a secret code for transmission over an trusted network Encryption Algorithm “The cow jumped over the moon” “4hsd4e3mjvd3sd a1d38esdf2w4d” Clear Text Encrypted Text

18 ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential -18- Symmetric Encryption Same key used to encrypt and decrypt message Same key used to encrypt and decrypt message Faster than asymmetric encryption Faster than asymmetric encryption Used by IPSec to encrypt actual message data Used by IPSec to encrypt actual message data Examples: DES, 3DES, RC5 Examples: DES, 3DES, RC5 Shared Secret Key

19 ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential -19- Asymmetric Encryption Different keys used to encrypt and decrypt message (One public, one private) Different keys used to encrypt and decrypt message (One public, one private) Provides non-repudiation of message or message integrity Provides non-repudiation of message or message integrity Examples include RSA, DSA, SHA-1, MD-5 Examples include RSA, DSA, SHA-1, MD-5 Alice Public Key Encrypt Alice Private Key Decrypt BobAlice

20 ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential -20- Industries That May Use a VPN  : enables the transferring of confidential patient information within the medical facilities & health care provider  Healthcare: enables the transferring of confidential patient information within the medical facilities & health care provider  : allow suppliers to view inventory & allow clients to purchase online safely  Manufacturing: allow suppliers to view inventory & allow clients to purchase online safely  : able to securely transfer sales data or customer info between stores & the headquarters  Retail: able to securely transfer sales data or customer info between stores & the headquarters  : enables account information to be transferred safely within departments & branches  Banking/Financial: enables account information to be transferred safely within departments & branches  : communication between remote employees can be securely exchanged  General Business: communication between remote employees can be securely exchanged

21 ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential -21- Some Businesses using a VPN CVS Pharmaceutical Corporation upgraded their frame relay network to an IP VPN Bacardi & Co. Implemented a 21- country, 44-location VPN

22 ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential -22- Questions

23 ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential -23- presented by : presented by : Iman Abooee Thanks for your attention Winter 85

24 ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential -24- Resource: www.vpnc.org/vpn-technologies.pdf www.adtran.com/ www.cisco.com/ipsec_wp.htm www.computerworld.com www.findvpn.com www. Shabake_mag.com


Download ppt "Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential -2--2- “ If saving money is wrong, I don’t want."

Similar presentations


Ads by Google