VPN’s Andrew Stormer COSC 356 Fall What is a VPN? Acronym – Virtual Private Network Acronym – Virtual Private Network Connects two or more private.

Slides:



Advertisements
Similar presentations
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
Advertisements

VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
SCSC 455 Computer Security Virtual Private Network (VPN)
WAN Technologies Dial-up modem connections Cheap Slow
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Guide to Network Defense and Countermeasures Second Edition
VIRTUAL PRIVATE NETWORKS (VPN). GROUP MEMBERS ERVAND AKOPYAN ORLANDO CANTON JR. JUAN DAVID OROZCO.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Virtual Private Networks Globalizing LANs Timothy Hohman.
Virtual Private Networking Karlene R. Samuels COSC513.
Chapter 10 Virtual Private Networks. VPN Defined  A segment of the public network made to appear part of a private network so that it can be used to.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Remote Networking Architectures
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
NetComm Wireless VPN Functionality Feature Spotlight.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
Networking Components By: Michael J. Hardrick. HUB  A low cost device that sends data from one computer to all others usually operating on Layer 1 of.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
WAN Technologies Dial-up modem connections
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
By Kevin Stevens UAT NTS4150. Definition: A Virtual Private Network (VPN) is a technology that allows secure communication via a “tunnel,” across public.
Virtual Private Networks Warren Toomey. Available WAN Links.
Examining Network Protocols. Overview Introduction to Protocols Protocols and Data Transmissions Common Protocols Other Communication Protocols Remote.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
PPTP Point-to-Point Tunneling Protocol (PPTP) –Problem: PPP was created for dialing into a local RAS server –But the site’s RAS may be far away –Long-distance.
1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
COMP3371 Cyber Security Richard Henson University of Worcester November 2015.
Networking Components WILLIAM NELSON LTEC HUB  Device that operated on Layer 1 of the OSI stack.  All I/O flows out all other ports besides the.
Virtual Private Networks Manraj Sekhon. What is a VPN?
.  Hubs send data from one computer to all other computers on the network. They are low-cost and low-function and typically operate at Layer 1 of the.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Virtual Private Networks
Virtual Private Network
CSCI 465 Data Communications and Networks Lecture 26
MTA Network Fundamental Cram Sesion
IPSec Detailed Description and VPN
Virtual Private Networks
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
VPN: Virtual Private Network
Richard Henson University of Worcester November 2016
Virtual Private Networks
Examining Network Protocols
Virtual Private Network (VPN)
Goals Introduce the Windows Server 2003 family of operating systems
Virtual Private Network
Firewalls Routers, Switches, Hubs VPNs
VPN: Virtual Private Network
Cengage Learning: Computer Networking from LANs to WANs
Presentation transcript:

VPN’s Andrew Stormer COSC 356 Fall 2004

What is a VPN? Acronym – Virtual Private Network Acronym – Virtual Private Network Connects two or more private networks over a public network Connects two or more private networks over a public network Uses an encrypted tunnel Uses an encrypted tunnel Offer same security and encryption features of private networks. Offer same security and encryption features of private networks.

History of VPN’s Began in 1995 Began in 1995 Automotive Industry Action Group Automotive Industry Action Group Fulfill need for secure and efficient communication between parties Fulfill need for secure and efficient communication between parties

Tunneling One network sends via 2 nd network connection One network sends via 2 nd network connection Encapsulate protocol within packets Encapsulate protocol within packets PPTP PPTP IPSec IPSec L2TP L2TP

PPTP Point-to-Point Tunneling Protocol Point-to-Point Tunneling Protocol Combination of PPP & TCP/IP Combination of PPP & TCP/IP Encapsulates information within IP packets Encapsulates information within IP packets

IPSec Internet Protocol Security Internet Protocol Security Developed by IETF Developed by IETF Secures OSI Layer 3 Secures OSI Layer 3 IPv4 & IPv6 compatible IPv4 & IPv6 compatible

L2TP Layer Two Tunneling Protocol Layer Two Tunneling Protocol Expansion of PPP Expansion of PPP Endpoints reside on different devices Endpoints reside on different devices Devices connected via packet switching Devices connected via packet switching

Encryption Data is encrypted at source Data is encrypted at source Decrypted at destination Decrypted at destination 3DES 3DES

3DES Triple Data Encryption Standard Triple Data Encryption Standard Expanded from DES in 1998 Expanded from DES in 1998 Uses DES algorithm 3 times Uses DES algorithm 3 times

Categories Hardware based Hardware based –encrypting routers Firewall based Firewall based –most secure Standalone application packages Standalone application packages –sometimes used to enhance hardware solutions

Features Support basic LAN interface Support basic LAN interface Authorization & encryption Authorization & encryption Data compression Data compression Routing ability Routing ability Network address translation Network address translation

VPN vs. Extranet VPN vs. Extranet Allow full access to company network neighborhood Allow full access to company network neighborhood Normal log-in information Normal log-in information Extremely regulated access to portion of intranet. Extremely regulated access to portion of intranet. Issuance of digital certificates Issuance of digital certificates

Benefits Reduce long-distance phone costs Reduce long-distance phone costs No long-term contracts No long-term contracts Offers flexibility to small and medium sized businesses Offers flexibility to small and medium sized businesses

Security Same security and encryption features as a private network. Same security and encryption features as a private network. Most secure connection when using a wireless device Most secure connection when using a wireless device

Setup a VPN Connection