Virtual Private Network

Slides:



Advertisements
Similar presentations
There are many types of WAN technologies that can be used to solve the problems of users who need network access from remote locations. We will go through.
Advertisements

Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
IS Network and Telecommunications Risks
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Virtual Private Networking Karlene R. Samuels COSC513.
Internet Security Seminar Class CS591 Presentation Topic: VPN.
Remote Networking Architectures
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Virtual Private Network
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Module 4: Designing Routing and Switching Requirements.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
VPN. What is VPN An arrangement that provides connections between: An arrangement that provides connections between: –Offices –remote workers and –the.
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
Virtual Private Networks Manraj Sekhon. What is a VPN?
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
VPN’s Andrew Stormer COSC 356 Fall What is a VPN? Acronym – Virtual Private Network Acronym – Virtual Private Network Connects two or more private.
Virtual Private Networks
Virtual Private Networks
Virtual Private Network
Virtual Private Network Access for Remote Networks
CSCI 465 Data Communications and Networks Lecture 26
Virtual Private Networks and IPSec
Virtual Private Networks
IPSec Detailed Description and VPN
Providing Teleworker Services
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Networks
Module 2: Configure Network Intrusion Detection and Prevention
Wide Area Network.
Virtual Private Networks (VPN)
VIRTUAL PRIVATE NETWORKS (VPN) BY: Diana Ashikyan Nikhil Jerath Connie Makalintal Midori Murata Midori Murata.
Virtual Private Networks
VIRTUAL PRIVATE NETWORKS (VPN)
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
Seminar Class CS591 Presentation Topic: VPN
Firewalls Routers, Switches, Hubs VPNs
Providing Teleworker Services
VPN: Virtual Private Network
Providing Teleworker Services
Cengage Learning: Computer Networking from LANs to WANs
Virtual Private Network
Topic 12: Virtual Private Networks
Global One Communications
Providing Teleworker Services
Presentation transcript:

Virtual Private Network prepared by Rachna Agrawal Lixia Hou

Virtual Private Network (VPN) VPNs are private data networks over public network – usually the Internet. VPNs extend corporate networks to remote offices, mobile users, telecommuters and other extranet partners. VPNs use advanced encryption and ‘tunneling’ technology to establish secure, end-to-end private network connections over Internet.

A typical VPN

VPN Solutions Remote access VPNs establish secure, encrypted connections between mobile or remote users and their corporate networks via a third-party network, such as a Internet Service Provider(ISP) - VPN client – software, hardware as well as router, or firewall based solutions available. - Reduced cost of long distance access calls and internal equipment inventory

VPN Solutions Site-to-Site VPNs are an alternative WAN infrastructure that used to connect branch offices, home offices, or business partners' sites to all or portions of a company's network. - Intranet VPNs provide full access to company’s network - Extranet VPNS provide business partners with limited access to a company’s network

VPN Technology Trusted VPNs – companies lease circuits from communication providers and use them in the same manner they use physical cables in a private LAN - Communication provider is ‘trusted’ for data integrity and security. - Used before Internet became universal

VPN Technology Secure VPNs use Internet as a corporate communication medium. Data is encrypted before sending, moved over to Internet, and then decrypted at the receiving end. - Encryption creates a security ‘tunnel’ that can’t be attacked - More desirable than Trusted VPNs

VPN Technology Hybrid VPNs – A secure VPN is created as part of the trusted VPN thus creating a ‘hybrid’ VPN. Secure part of the VPN is usually administered by customer (using VPN equipments). Secure VPNs that are administered by ISPs are called provider-provisioned VPNs.

VPN Building Blocks Security is built around authentication, authorization, and accounting capabilities. Network, data, and addresses are encrypted so they are understood by right sender and receiver only.

VPN Building Blocks Quality of Service addresses two fundamental requirements – predictable performance and policy implementation QoS capabilities allow users to prioritize service classes, manage bandwidth, and avoid congestion. Pkt. classification based on IP address, TCP/UDP port no, IP precedence(3bits in the ToS field of IP header), MAC address, URLs & sub-URLs

VPN Building Blocks Management of devices – ‘simpler is better’ Element-based – less expensive. adequate for managing & monitoring small setup Policy-based – centralized for larger networks, policies established and push them to all applicable devices Outsource VPN management to the ISP or SASP

VPN Building Blocks VPNs provide reliable access to network VPN software allows transmitted data packets to transparently switch over to a different path in case of a device failure Redundancy in hardware components reduces the risk of downtime

VPN: making choices Do-it-Yourself VPNs - four basic areas of consideration: Internet Service Security Policy Server A Public Key Infrastructure (PKI) system - VPN gateway solution

VPN Gateways VPN gateways can be categorized as Standalone or Integrated. Standalone VPNs incorporate purpose-built devices between - the source of data and WAN link OR between the modem and a data source in a remote office. Integrated implementations add VPN functionality to existing devices such as routers, firewalls.

Gateway Solutions Router based VPNs – adding encryption support to existing router(s) can keep the upgrade costs of VPN low. Firewall based VPNs – workable solution for small networks with low traffic volume. Software based VPNs – good solution for better understanding a VPN, software runs on existing servers and share resources with them

Gateway Solutions Internet Security Devices – Standalone VPN devices specifically designed for tunneling, encryption, authentication are easier to setup and make attractive choice for business looking for ‘turn key’ solutions

Outsourcing Things to consider before outsourcing - For connecting remote offices consider an ISP that also offers POP to connect to Internet as a local call Redundancy of equipment, connections, and people Provider policies, equipment, employee qualification to deal with outside hackers and viruses On-site consulting assistance

VPN Protocols IPSec – Internet standard protocol for tunneling. Encryption, and authentication. Layer2Tunneling Protocol (L2TP) – Provides a means for tunneling IP traffic in layer 2, encloses non-Internet protocols i.e. IPX, SNA, and AppleTalk inside IP envelope. Point-to-Point tunneling - proprietary Microsoft

Benefits of using VPN Lower costs – remote access costs have reduced by 80 percent while LAN-to-LAN connectivity costs is reduced by 20-40 percent. For companies just setting up their network VPN provides low-cost alternative to backbone equipment, in-house terminal equipment and access modems. Connectivity Improvements – VPN based links are easy and inexpensive ways to meet changing business demands.

Benefits of VPN Anywhere anytime access – ubiquitous public internet offers transparent access to central corporate systems i.e. email, directories, internal-external web-sites. VPN technology is improving rapidly and promises a bright future for data communication, its cost-effective, and high returns on investment will outweigh any skittishness in investing in new technology.