Presentation is loading. Please wait.

Presentation is loading. Please wait.

Virtual Private Networks By: Scott Ayers Stacey Bilodeau David Jordan.

Similar presentations


Presentation on theme: "Virtual Private Networks By: Scott Ayers Stacey Bilodeau David Jordan."— Presentation transcript:

1 Virtual Private Networks By: Scott Ayers Stacey Bilodeau David Jordan

2 Transition From Leased Lines to VPNs  Quick History Lesson.  What is a VPN?  Virtual  Private  Network  Leased Line Network Versus VPN  ANX  Cost Comparison

3 Example of a leased line network Leasing the lines 24 hours a day even though the line is not used. If one line breaks there is no redundancy. Expensive to lease.

4 Example of a VPN It is a shared network and therefore the costs are shared. The costs associated to a VPN are less than a leased line. There is great redundancy.

5 Prices are dated for the year 2000. Cost Comparison

6 Protocols:Protocols: PPTP(Point-to- point tunneling protocol) PPTP(Point-to- point tunneling protocol) – Developed by many companies such as Microsoft – Designed for remote- access – Operates at layer 2 L2TP(Layer 2 Tunneling Protocol) – Combination of PPTP and Cisco’s L2F – Used for remote-access and site-site – Operates at layer 2

7 Protocols:Protocols: IPSec(Internet Protocol Security) IPSec(Internet Protocol Security) – Suite of protocols that provide secure tunneling of IP packets only – Use for site-to-site – Operates at Layer 3 – Integrated into IPv6 SOCKSv5 with SSL- – SOCKSv5 is a standard for authenticating traffic across firewalls – SOCKSv5 with SSL allows for the creation of a VPN connection on any firewall – It controls data at Layer 5

8 Advantages and Disadvantages Advantages: Advantages: – Cost Savings – Scalability Uses the Internet Uses the Internet Disadvantages – Uses the Internet Limited bandwidth Single point of failure Security concerns No QoS – False Sense of Security

9 False Sense of Security VPNs protect against eavesdropping and insertion attacks. VPNs protect against eavesdropping and insertion attacks. VPNs do not protect against viruses or attacks being passed through the VPN tunnel. VPNs do not protect against viruses or attacks being passed through the VPN tunnel.

10 What do I need? Software Software Hardware Hardware Medium Medium Concern

11 ScenarioScenario

12 THANK YOU This Presentation and accompanying Research Paper can be viewed at the following website: http://www.geocities.com/sbilode/DEVRY1.html


Download ppt "Virtual Private Networks By: Scott Ayers Stacey Bilodeau David Jordan."

Similar presentations


Ads by Google