Virtual Private Networks: Trends and Strategies Presented by: Rick Blum Victor Danevich Brian Schulz

Slides:



Advertisements
Similar presentations
All rights reserved © 2000, Alcatel 1 CPE-based VPNs Hans De Neve Alcatel Network Strategy Group.
Advertisements

Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
© 2014 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 High-performance Gigabit Ethernet ports rapidly transfer large files supporting.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets Chapter 4.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
VPNs Virtual Private Networks. VPNs: Purpose Emulate a private network using shared Service Provider infrastructure Same policies as private network What.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
Virtual Private Networking Karlene R. Samuels COSC513.
SESSION 9 THE INTERNET AND THE NEW INFORMATION NEW INFORMATIONTECHNOLOGYINFRASTRUCTURE.
Internet Security Seminar Class CS591 Presentation Topic: VPN.
Remote Networking Architectures
1 © 2001, Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Easy VPN Solutions Applications and Implementation with Cisco IOS.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
Improving Customer Satisfaction Through Advances in Remote Management Technology Greg Michel Product Manager Quintum Technologies Inc.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Virtual Private Network
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Week #10 Objectives: Remote Access and Mobile Computing Configure Mobile Computer and Device Settings Configure Remote Desktop and Remote Assistance for.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
IPv4 TO IPv6 TRANSITION AND INTEROPERABILITY FOR TELECOM SERVICE PROVIDER Business Problem In today’s environment of growing connectivity where almost.
Module 8 Configuring Mobile Computing and Remote Access in Windows® 7.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
VPN. What is VPN An arrangement that provides connections between: An arrangement that provides connections between: –Offices –remote workers and –the.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
Chapter 17 THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition THE FUTURE OF BUSINESS Gitman & McDaniel 5 th Edition Chapter Using Technology to Manage.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Virtual Private Networks Manraj Sekhon. What is a VPN?
Information systems and management in business Chapter 2 Electronic Business and Business Mobility.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Avtec Inc Virtualization - Securely Moving to the Cloud.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks
And Presents Spring Forum 2002.
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Virtual Private Networks
Components of information systems
(1888 PressRelease) Staying Ahead of Today’s Rapidly Evolving Security Landscape
Virtual Private Networks (VPN)
IS4550 Security Policies and Implementation
VIRTUAL PRIVATE NETWORKS (VPN)
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
Mitel Network – SIP Trunking Discussion
Goals Introduce the Windows Server 2003 family of operating systems
Check Point Connectra NGX R60
Seminar Class CS591 Presentation Topic: VPN
Virtual Private Network
Professional Network Services
Providing Teleworker Services
Providing Teleworker Services
Cengage Learning: Computer Networking from LANs to WANs
Virtual Private Network
Topic 12: Virtual Private Networks
Global One Communications
Providing Teleworker Services
Presentation transcript:

Virtual Private Networks: Trends and Strategies Presented by: Rick Blum Victor Danevich Brian Schulz January 19, 2000 Lucent NetCare Knowledge Seminars Sharing the Knowledge Behind the Network

10/1/ Background s Lucent NetCare Professional Services is a provider of communications consulting, intelligent maintenance, and management solutions for next generation networks. s Seminar Objectives Provide insight into current efforts and future plans for virtual private networks (VPNs). Help organizations assess their progress developing VPN solutions. Identify barriers and challenges to achieving goals.

10/1/ VPN Definition A computer network designed to use a shared WAN infrastructure to securely transport data communications using IP. Internal implementation: all VPN functionality resides outside the service provider network (WAN). Managed solutions: provided by carrier VPN capabilities via carrier POP, or Carrier managed premises equipment

10/1/ Secure Internet/IP VPNs Shared IP Network Branch Offices Corporate Headquarters Customers, Suppliers Remote Workers Internet Secure IP VPN emulates a private network over a shared IP network, often the public Internet.

10/1/ Market Trends s Improve remote access for Mobile workers Branch offices Partners and customers (extranet) s Promise of substantial reductions in WAN costs s Quickly evolving technology s Market has moved from curiosity to deployment

10/1/ Importance to IT Strategy of Implementing or Improving VPN

10/1/ Most Important Networking Objective Driving VPN Strategy

10/1/ Situation: Large Accounting/Consulting Firm s75,000 potential remote access users s7 million minutes connect time/mo. sDial-up cost $0.07/minute over “800” line sTotal monthly connection cost = $490,000 VPN Solution: s4,500 users created 90% of traffic sConnect to VPN via $20/mo. sVPN implementation cost minimal using existing technologies sOngoing savings = $350,000/mo. Case Study: Cost Reduction

10/1/ Multiple VPN Stakeholders/Types ? Decision IT Network Organization IT Security Group Finance Firewall-based Router-based Server-based Dedicated device

10/1/ Internal Firewall-Based VPN Firewall- based VPN Gateway Firewall- based VPN Gateway Server Wkstn File Server Server Wkstn VPN Tunnel VPN Mgmt. Domain VPN Mgmt. Domain Internet or shared network

10/1/ Internal Router-Based VPN Router- based VPN Gateway Router- based VPN Gateway Server Wkstn File Server Server Wkstn VPN Tunnel Internet or shared network VPN Mgmt. Domain VPN Mgmt. Domain

10/1/ Internal Server-Based VPN Server- based VPN Gateway Server- based VPN Gateway Server Wkstn File Server Server Wkstn VPN Tunnel Internet or shared network VPN Mgmt. Domain VPN Mgmt. Domain

10/1/ Internal Dedicated VPN Device Dedicated VPN Gateway Dedicated VPN Gateway Server Wkstn File Server Server Wkstn VPN Tunnel Internet or shared network VPN Mgmt. Domain VPN Mgmt. Domain

10/1/ One Client, Multiple VPN Implementations Situation: Large Bank with 800 Clients sFirewall-based: Remote access sRouter-based: WAN connectivity sSoftware-based: Disaster recovery sDedicated device: Multiple clients

10/1/ VPN Types Implemented or Being Considered

10/1/ Managed VPN Solution SP VPN Gateway SP VPN Gateway Server Wkstn File Server Server Wkstn VPN Tunnel Internet or shared network VPN Management Domain

10/1/ Managed VPN Solution s Encrypted IPSec tunnels secure data traversing the shared IP infrastructure. s Global VPN NOC configures, monitors and manages all customers’ VPNs. s VPN Routers (managed CPE) shape traffic, collect performance statistics and route customer traffic. s Remote access users employ PC client software to securely access data at corporate sites. Enterprise B Site 1 Company A Site 3 Company A Site 2 Company A Site 1 Enterprise B Site 2 Enterprise B Site 3 Enterprise B Remote User Company A Remote User Encrypted Traffic Global VPN NOC Network Monitoring VPN Config.

10/1/ VPN Tunneling Protocols Implemented or Planned to be Implemented

10/1/ Authentication Technologies Implemented or Planned to be Implemented

10/1/ VPN Gap

10/1/ Area That is Biggest Challenge to Resolving VPN Issues

10/1/ Organizational Considerations sPolicies s Staffing sProcedures sSupport

10/1/ Areas in Which Help is Needed to Evaluate, Implement, or Enhance VPN Capabilities

10/1/ The Bottom Line sA shortage of experienced network professionals skilled in VPN technologies will remain for some time. sEvaluations of the advantages of an internal implementation versus a managed VPN service should give due consideration to the cost of acquiring and/or retaining VPN expertise while ultimate technological directions are still uncertain.

10/1/ The Bottom Line (cont.) sVPN protocols and technologies for access and authentication are still evolving, as are the various options for implementing a VPN in software or hardware. sBalance short-term needs for specific capabilities against long-term advantages of compatibility and interoperability. The goal is to find a solution that will follow these tenets, and also provide scalability as VPN products mature.

10/1/ The Bottom Line (cont.) sTechnology will be only the starting point for a successful VPN strategy. In the earliest stages of planning, consider the organizational impact of the VPN. sBuild into the overall plan the specific processes, procedures, and end-user training that will be required to smoothly transition to a VPN computing model.

10/1/ Lucent Knows VPNs s Lucent NetCare Professional Services Network consulting services Network security practice s Lucent VPN Product Set VPN RoutersVPN Policy Manager VPN Gateway Integral VPN Client s Lucent VPNWorX End-to-End Solution Enterprises Service Providers

10/1/ Question and Answer Q&A ? !

10/1/ Thank You s VPN Whitepaper Available after Web Seminar at s Feedback Survey Tell us what you think about this seminar s For More Information Call NetCare