Virtual Private Network (VPN)

Slides:



Advertisements
Similar presentations
Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
Advertisements

1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
1 DSL BASED NETWORK FOR 2 Vision Statement Specializing in broadband network solutions including high-speed internet access, data, voice and video services,
1 DSL BASED NETWORK FOR Air Line Pilots Association International.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Virtual Private Networks Globalizing LANs Timothy Hohman.
Virtual Private Networking Karlene R. Samuels COSC513.
VIRTUAL PRIVATE NETWORKS (VPN)
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Remote Networking Architectures
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
Virtual Private Network
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Virtual Private Networks Alberto Pace. IT/IS Technical Meeting – January 2002 What is a VPN ? u A technology that allows to send confidential data securely.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
WAN Technologies Dial-up modem connections
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
Virtual Private Network (VPN)
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
VIRTUAL PRIVATE NETWORKS (VPN) By s k satapathy s k satapathy clicktechsolution.com.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks
Virtual Private Networks
Case Study: Cisco VPN Client
Virtual Private Networks
Virtual Private Network
Virtual Private Networks
Virtual Private Networks
Providing Teleworker Services
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Discovering Computers 2010: Living in a Digital World Chapter 14
Remote Access Lecture 2.
Module 2: Configure Network Intrusion Detection and Prevention
Virtual Private Networks (VPN)
VIRTUAL PRIVATE NETWORKS (VPN) BY: Diana Ashikyan Nikhil Jerath Connie Makalintal Midori Murata Midori Murata.
Virtual Private Networks
Chapter 1: WAN Concepts Connecting Networks
VIRTUAL PRIVATE NETWORKS (VPN)
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
Goals Introduce the Windows Server 2003 family of operating systems
Seminar Class CS591 Presentation Topic: VPN
Virtual Private Network
VPN: Virtual Private Network
Connectivity methods. Connectivity methods Exam Answer WAN/LAN  Each office will have its own Local Area Network or LAN.  But the company also wants.
Virtual Private Network
Virtual Private Networks (VPN)
Topic 12: Virtual Private Networks
Presentation transcript:

Virtual Private Network (VPN)

outline What is a VPN? Types of VPN Why use VPNs? Disadvantage of VPN Types of VPN protocols Encryption

What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and encryption to protect data integrity and confidentiality VPN Internet A Virtual Private Network is a private connection over an open network. This could mean encrypting traffic as it passes over a frame relay circuit, but the term is most commonly used to describe a method of sending information privately between two points across the Internet or other IP-based network. It enables organizations to quickly set up confidential communications to branch sites, remote workers, or to business partners in a cost effective way. To accomplish this, a VPN needs to have a standard way of encrypting data and ensuring the the identities of all parties. There are four basic types of deployment that VPNs are use for: Remote Access, Site-to-Site, Extranet, and Client/Server. We’ll look at each in more detail. VPN

Types of VPNs Remote Access VPN Provides access to internal corporate network over the Internet. Reduces long distance, modem bank, and technical support costs. Corporate Site Internet

Types of VPNs Site-to-Site VPN Connects multiple offices over Internet Corporate Site Remote Access VPN Site-to-Site VPN Connects multiple offices over Internet Reduces dependencies on frame relay and leased lines Internet Branch Office

Types of VPNs Remote Access VPN Site-to-Site VPN Extranet VPN Provides business partners access to critical information (leads, sales tools, etc) Reduces transaction and operational costs Corporate Site Internet Partner #2 Partner #1

LAN clients with sensitive data Types of VPNs Remote Access VPN Site-to-Site VPN Extranet VPN Intranet VPN: Links corporate headquarters, remote offices, and branch offices over a shared infrastructure using dedicated connections. Database Server LAN clients Internet LAN clients with sensitive data

Why Use Virtual Private Networks? More flexibility Use multiple connection types (cable, DSL, T1, T3) Secure and low-cost way to link Ubiquitous ISP services Easier E-commerce As VPNs become more common, the question is, “Why move from these other technologies?” There are three main reasons: Flexibility, Scalability, and Cost. The first benefit we’ll look at is the flexibility offered by VPNs. Because they use the existing connections to the Internet, rather than specialized connections between points or phone lines, they provide organizations with geographical flexibility. Major ISPs have points of presence in most large metropolitan areas, and can support connections for branch offices. Also, because

Why Use Virtual Private Networks? More flexibility More scalability Add new sites, users quickly Scale bandwidth to meet demand

Why Use Virtual Private Networks? More flexibility More scalability Lower costs Reduced frame relay/leased line costs Reduced long distance Reduced equipment costs (modem banks,CSU/DSUs) Reduced technical training and support

VPN Return on Investment Case History – Professional Services Company 5 branch offices, 1 large corporate office, 200 remote access users. Payback: 1.04 months. Annual Savings: 88% Check Point VPN Solution Non-VPN Solution Savings with Startup Costs (Hardware and Software) $51,965 Existing; sunk costs = $0 Site-to-Site Annual Cost $30,485 $71,664 Frame relay $41,180 /yr RAS $48,000 $604,800 Dial-in costs $556,800 /yr Combined $78,485 $676,464 $597,980 /yr ROI Calculations: Configurations used to calculate the ROI are described below, and are conservative: they are biased towards the frame relay solution. ROI and pricing are based on Q2 promotional bundled pricing for the End-to-End Security Package. Site-to-site: VPN-1 solution has 5 sites have DSL-to-Internet connections, with a T1 Internet connection at HQ. Traditional solution has 5 sites connected to HQ with 64K CIR / 128 port speed connections, with a T1 Internet connection at HQ. The traditional configuration provides for a conservative comparison as it does not provide for link redundancy. Remote Access: VPN-1 solution has 200 remote access users with unlimited access consumer dial-up @ $20/month. The Traditional solution has 200 remote access users who average 2 hours/per day, 56K/64K dial-up @ .10/minute Support: For VPN-1, pricing includes a Software Subscription but not Platinum, Gold or Silver Support. The traditional pricing does not include support. Scenario Validation is provided within a 2001 Datamonitor Report: Secure Remote Access Solutions: Profiting from the VPN opportunity. Site-to-site: Secure Intranets allow companies to link branch offices to their central IT resource…SMEs, however, would not be measuring VPNs against leased lines, which would not be economically viable. To the SME, VPN technology offers the first affordable and secure broadband, when coupled with DSL or cable access. Remote access: Remote access applications…connect home workers and traveling executives or sales staff with their central IT resource. The cost savings are particularly clear when comparing the cost of dialing in to a local ISP and making long-distance calls to a central office in another part of the country. Although remote access penetration rates are high…70% of remote users are traveling executives or members of the sales force. Currently, 60% of all remote access services are accessed by simple dial-up modems compared to only 3% by DSL. A great opportunity for remote access solution vendors will come when the number of home workers using remote access solutions increases…Currently, the simple 56k modem remains the most popular option by far, as it presents the cheapest alternative.

Disadvantages of VPN Lower bandwidth available compared to dial-in line Inconsistent remote access performance due to changes in Internet connectivity No entrance into the network if the Internet connection is broken

Point-to-Point Tunneling Protocol (PPTP) Layer 2 remote access VPN distributed with Windows product family Addition to Point-to-Point Protocol (PPP) Allows multiple Layer 3 Protocols Uses proprietary authentication and encryption Limited user management and scalability Used MPPE encryption method Corporate Network Remote PPTP Client PPTP RAS Server Internet ISP Remote Access Switch

Layer 2 Tunneling Protocol (L2TP) Layer 2 remote access VPN protocol Combines and extends PPTP and L2F (Cisco supported protocol) Weak authentication and encryption Addition to Point-to-Point Protocol (PPP) Must be combined with IPSec for enterprise-level security Corporate Network Remote L2TP Client L2TP Server Internet ISP L2TP Concentrator

Internet Protocol Security (IPSec) Layer 3 protocol for remote access, intranet, and extranet VPNs Internet standard for VPNs Provides flexible encryption and message authentication/integrity

Encryption Used to convert data to a secret code for transmission over an trusted network Encrypted Text Clear Text Encryption Algorithm “The cow jumped over the moon” “4hsd4e3mjvd3sd a1d38esdf2w4d”

Symmetric Encryption Same key used to encrypt and decrypt message Faster than asymmetric encryption Used by IPSec to encrypt actual message data Examples: DES, 3DES, RC5 Shared Secret Key

Asymmetric Encryption Different keys used to encrypt and decrypt message (One public, one private) Provides non-repudiation of message or message integrity Examples include RSA, DSA, SHA-1, MD-5 Bob Alice Alice Public Key Encrypt Alice Private Key Decrypt

Industries That May Use a VPN Healthcare: enables the transferring of confidential patient information within the medical facilities & health care provider Manufacturing: allow suppliers to view inventory & allow clients to purchase online safely Retail: able to securely transfer sales data or customer info between stores & the headquarters Banking/Financial: enables account information to be transferred safely within departments & branches General Business: communication between remote employees can be securely exchanged

Some Businesses using a VPN CVS Pharmaceutical Corporation upgraded their frame relay network to an IP VPN Bacardi & Co. Implemented a 21-country, 44-location VPN

Questions

Thanks for your attention presented by : Iman Abooee Thanks for your attention Winter 85

Resource: www.vpnc.org/vpn-technologies.pdf www.adtran.com/ www.cisco.com/ipsec_wp.htm www.computerworld.com www.findvpn.com www. Shabake_mag.com