Virtual Private Networks (VPN)

Slides:



Advertisements
Similar presentations
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Advertisements

Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Module 5: Configuring Access for Remote Clients and Networks.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
Virtual Private Networking Karlene R. Samuels COSC513.
VIRTUAL PRIVATE NETWORKS (VPN)
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Remote Networking Architectures
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Virtual Private Network
Remote Access Chicca Kusumawardani Spring Introduction Company using a remote access Is it a good idea giving employees remote access? Is it expensive.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
VIRTUAL PRIVATE NETWORKS (VPN) By s k satapathy s k satapathy clicktechsolution.com.
Virtual Private Networks Manraj Sekhon. What is a VPN?
VPN: Virtual Private Network Presented By: Wesam Shuldhum ID:
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks
Virtual Private Networks
Virtual Private Network
CSCI 465 Data Communications and Networks Lecture 26
Virtual Private Networks and IPSec
Virtual Private Networks
Virtual Private Networks
Providing Teleworker Services
Virtual Private Networks (VPN)
Virtual Private Network (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Microsoft Windows NT 4.0 Authentication Protocols
Virtual Private Networks
VPN: Virtual Private Network
Introduction to Computers
CIT 480: Securing Computer Systems
VIRTUAL PRIVATE NETWORKS (VPN) BY: Diana Ashikyan Nikhil Jerath Connie Makalintal Midori Murata Midori Murata.
VIRTUAL PRIVATE NETWORKS (VPN)
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
Virtual Private Network
VPN: Virtual Private Network
Cengage Learning: Computer Networking from LANs to WANs
Unit 8 Network Security.
Virtual Private Network
Virtual Private Networks (VPN)
Virtual Private Network zswu
Topic 12: Virtual Private Networks
Presentation transcript:

Virtual Private Networks (VPN)

A virtual private network (VPN) A virtual private network (VPN) is a technology that creates a safe and encrypted connection over a less secure network, such as the internet.  developed as a way to allow remote users and branch offices to securely access corporate applications and other resources.

Advantages of VPN Employees can access the network (Intranet) from remote locations. Cost Savings. it ensures the appropriate level of security to the connected systems when the underlying network infrastructure alone cannot provide it. 

Disadvantages of VPN VPN performance can be affected by a variety of factors: The speed of users' internet connections. The types of protocols an internet service provider may use. The type of encryption the VPN uses. Poor quality of service and conditions that are outside the control of IT.

Brief Overview of How it Works Two connections; one is made to the Internet and the second is made to the VPN. Datagrams ; contains data, destination and source information. Firewalls; VPNs allow authorized users to pass through the firewalls. Protocols; protocols create the VPN tunnels.

Encrypted Inner Datagram Tunneling - A virtual point-to-point connection made through a public network. - It transports encapsulated datagrams. Original Datagram Encrypted Inner Datagram Datagram Header Outer Datagram Data Area Data Encapsulation

Encryption Encryption: is a method of “scrambling” data before transmitting it onto the Internet. Public Key Encryption Technique. Digital signature for authentication.

VPN protocols There are several different protocols used to secure and encrypt users and corporate data: - IP security (IPsec). - Secure Sockets Layer (SSL) and Transport Layer Security (TLS). - Point-To-Point Tunneling Protocol (PPTP).  - Layer 2 Tunneling Protocol (L2TP).  - OpenVPN.

Types of VPNs Remote-access VPN  Site-to-site VPN

Remote-access VPN  uses a public telecommunication infrastructure like the internet to provide remote users secure access to their organization's network. Relies on either IPsec or Secure Sockets Layer (SSL).

Remote-access VPN  A VPN client on the remote user's computer or mobile device connects to a VPN gateway on the organization's network. The gateway typically requires the device to authenticate its identity. Then, it creates a network link back to the device that allows it to reach internal network resources -- e.g., file servers, printers and intranets -- as though it was on that network locally.

Remote-access VPN A remote-access VPN connection allows an individual user to connect to a private business network from a remote location using a laptop or desktop computer connected to the Internet.

Site-to-site VPN allows offices in multiple fixed locations to establish secure connections with each other over a public network such as the Internet.  Extends the company's network, making computer resources from one location available to employees at other locations.

Site-to-site VPN An example of a company that needs a site-to-site VPN is a growing corporation with dozens of branch offices around the world. This saves the company hardware and management expenses. Most site-to-site VPNs connecting over the internet use IPsec. 

Site-to-site VPN A site-to-site VPN connection lets branch offices use the Internet as a conduit for accessing the main office's intranet.

Industries That May Use a VPN Healthcare: enables the transferring of confidential patient information within the medical facilities & health care provider. Manufacturing: allow suppliers to view inventory & allow clients to purchase online safely. Retail: able to securely transfer sales data or customer info between stores & the headquarters. Banking/Financial: enables account information to be transferred safely within departments & branches. General Business: communication between remote employees can be securely exchanged