1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.

Slides:



Advertisements
Similar presentations
Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
Advertisements

1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Human Computer Interaction - Fall 2010 Class project By Khang Nguyen Virtual Private Network Design for Remote Access Cambridge - SFO Airport.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Guide to Network Defense and Countermeasures Second Edition
VIRTUAL PRIVATE NETWORKS (VPN). GROUP MEMBERS ERVAND AKOPYAN ORLANDO CANTON JR. JUAN DAVID OROZCO.
Hands-On Microsoft Windows Server 2003 Administration Chapter 11 Administering Remote Access Services.
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Virtual Private Networks Globalizing LANs Timothy Hohman.
Virtual Private Networking Karlene R. Samuels COSC513.
Internet Security Seminar Class CS591 Presentation Topic: VPN.
MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 10 Configuring Remote Access.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Remote Networking Architectures
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Virtual Private Network
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Virtual Private Networks An Economical Option for Broadband Connectivity.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
WAN Technologies Dial-up modem connections
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
11.59 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 11: Introducing WINS, DNS,
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Virtual Private Network (VPN)
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
Virtual Private Networks Manraj Sekhon. What is a VPN?
Remote Access and Long-Distance Communications. Permission granted to reproduce for educational use only.© Goodheart-Willcox Co., Inc. Typical Telephone.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks
Providing Teleworker Services
Virtual Private Networks
Virtual Private Network (VPN)
Remote Access Lecture 2.
Virtual Private Networks (VPN)
VIRTUAL PRIVATE NETWORKS (VPN)
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
Virtual Private Network
VPN: Virtual Private Network
Presentation transcript:

1 Intel / Shiva VPN Solutions Stephen Wong System Engineer

2 Agenda VPN Concept VPN Benefit Shiva VPN Suite Case Study - Open University Conclusion VPN Concept VPN Benefit Shiva VPN Suite Case Study - Open University Conclusion

3 A VPN (Virtual Private Network) Is a Technology That Connects Individuals and Systems Securely Over the Internet. Internet ISPModemsISPModems VPNGatewayVPNGateway VPN GatewayVPN Corporate LAN Corporate LAN Remote LAN Remote LAN Headquarters Branch Office Traveling Employee or Telecommuter VPN Client VPN Client VPN Provides a New Option

4 Secure VPN Tunnel Internet ISPModemsISPModems CorporateModemsCorporateModems LAN Local Long Distance VPN Gateway VPN Gateway Telephone Network VPN Client VPN Client Router/FirewallRouter/Firewall Remote Access: Dial and VPN

5 San Francisco New York Dallas Chicago Fully Meshed Leased Line or Frame Relay Network San Francisco New York Dallas Chicago Internet Fully meshed VPN network LAN-to-LAN: Leased Line and VPN

6 VPN Benefits Save Money (Reduce NW Costs by 30-60%) –Eliminate long distance charges –Reduce private leased line charges Increase Business Speed and Flexibility –Internet can be accessed everywhere through many technologies –Internet capacity is available on demand Save Money (Reduce NW Costs by 30-60%) –Eliminate long distance charges –Reduce private leased line charges Increase Business Speed and Flexibility –Internet can be accessed everywhere through many technologies –Internet capacity is available on demand

7 VPN Technology Basic VPN Concepts –Tunneling –Encryption –Authentication Associated VPN Concepts –Routing –Firewalling –Load Balancing Basic VPN Concepts –Tunneling –Encryption –Authentication Associated VPN Concepts –Routing –Firewalling –Load Balancing

8 Definition Tunnels are a method of transmitting private data over public networks Tunnels employ a technique called “encapsulation” Secure Tunnels are tunnels that guarantee the privacy and integrity of the transmitted data and the authenticity of the parties communicating Standards Alternatives PPTP, L2F, L2TP (Layer 2, Remote Access Only, Not Secure) IPSec (Layer 3, Remote Access AND LAN-to-LAN, Strong Security) Tunneling Benefits hides network topology and application information connect “un-routed” networks across the Internet Definition Tunnels are a method of transmitting private data over public networks Tunnels employ a technique called “encapsulation” Secure Tunnels are tunnels that guarantee the privacy and integrity of the transmitted data and the authenticity of the parties communicating Standards Alternatives PPTP, L2F, L2TP (Layer 2, Remote Access Only, Not Secure) IPSec (Layer 3, Remote Access AND LAN-to-LAN, Strong Security) Tunneling Benefits hides network topology and application information connect “un-routed” networks across the Internet Internet Basics: Tunneling

9 Basics: Encryption Encryption Ensures the Privacy and Integrity of Transmitted Data Encryption Terms –DES - encryption standard (also known as 56-bit) –3DES bit encryption standard; most secure –Public and Private keys –IKE - Internet Key Exchange Level of Security Is Dependent On: –Strength of the underlying algorithm –Key length (512, 1024, or 2048-bit) –Frequency of key change Encryption Ensures the Privacy and Integrity of Transmitted Data Encryption Terms –DES - encryption standard (also known as 56-bit) –3DES bit encryption standard; most secure –Public and Private keys –IKE - Internet Key Exchange Level of Security Is Dependent On: –Strength of the underlying algorithm –Key length (512, 1024, or 2048-bit) –Frequency of key change

10 Basics: Authentication Authentication Guarantees the Identity and Authority of the VPN Participants Choices Include: –Technologies: passwords, challenge phrase, tokens with one- time passwords, and X.509 digital certificates –Products: NT Domains, NDS, RADIUS, SDI, Entrust, Shiva CA A VPN Solution Should Allow You to Choose the Authentication Method That Matches Your Needs Authentication Guarantees the Identity and Authority of the VPN Participants Choices Include: –Technologies: passwords, challenge phrase, tokens with one- time passwords, and X.509 digital certificates –Products: NT Domains, NDS, RADIUS, SDI, Entrust, Shiva CA A VPN Solution Should Allow You to Choose the Authentication Method That Matches Your Needs

11 Shiva’s VPN Suite

12 VPN Components LanRover VPN Gateway –Dedicated Hardware Platform –Dedicated Triple-DES acceleration hardware –Integrated ICSA-certified firewall & routing –Scalability (load balancing & redundancy) Shiva VPN Client for Windows 95, 98 and NT –Transparent to end user –Works with existing client and server applications Shiva Certificate Authority –Best security available Shiva VPN Manager –Centralized management of distributed gateways LanRover VPN Gateway –Dedicated Hardware Platform –Dedicated Triple-DES acceleration hardware –Integrated ICSA-certified firewall & routing –Scalability (load balancing & redundancy) Shiva VPN Client for Windows 95, 98 and NT –Transparent to end user –Works with existing client and server applications Shiva Certificate Authority –Best security available Shiva VPN Manager –Centralized management of distributed gateways

13 Shiva VPN Client Client Software for Windows 95, 98, and NT Platforms Establishes an Encrypted Tunnel From the Client to the LanRover VPN Gateway –Supports the same tunneling, encryption and authentication protocols as LanRover VPN Gateway Interoperates Transparently With Existing Business Applications Such As and Databases Supports Dial-up, Cable Modem, DSL and LAN Connections Supports Compression for Improved Performance Client Software for Windows 95, 98, and NT Platforms Establishes an Encrypted Tunnel From the Client to the LanRover VPN Gateway –Supports the same tunneling, encryption and authentication protocols as LanRover VPN Gateway Interoperates Transparently With Existing Business Applications Such As and Databases Supports Dial-up, Cable Modem, DSL and LAN Connections Supports Compression for Improved Performance

14 Case Studies - Open University (Intel / Shiva VPN Solution) Remote Access

15 ISSUES –Security for remote users (encryption, tunneling, authentication) –Sensitive information (Course material, etc) –Long distance charges for oversea students –Protect internal network with Firewall –Same username and password in different applications(e.g. RAS, VPN, Mail, etc) ISSUES –Security for remote users (encryption, tunneling, authentication) –Sensitive information (Course material, etc) –Long distance charges for oversea students –Protect internal network with Firewall –Same username and password in different applications(e.g. RAS, VPN, Mail, etc) Case Study - Open University

16 Case Study - Open University Open University: –An University base in Hong Kong SOLUTION –Shiva VPN Client provides access through VPN tunnels –Security with encryption, tunneling and digital certificates –No long distance charges –ICSA-Certified firewall in Shiva VPN Gateway –In process of replacing frame relay with office to office VPN across the Internet –Shiva Access Manager provide Integrated VPN and RAS solution and provide proxy services to UNIX, KEBEROS Open University: –An University base in Hong Kong SOLUTION –Shiva VPN Client provides access through VPN tunnels –Security with encryption, tunneling and digital certificates –No long distance charges –ICSA-Certified firewall in Shiva VPN Gateway –In process of replacing frame relay with office to office VPN across the Internet –Shiva Access Manager provide Integrated VPN and RAS solution and provide proxy services to UNIX, KEBEROS

17 Case Study: Education Internet Router Management Consultant dialing any local ISP Benefits: Extend the campus network to remote students Eliminate long distance toll charges Supplement direct- dial capacity Single Login for UNIX, RAS, VPN Open University Library System File Servers Shiva Access Manager Shiva VPN Client ISP POP LanRover VPN Gateway

18 Conclusion Save Money (Reduce NW Costs by 30-60%) Increase Business Speed and Flexibility Improve Security Use Existing Applications, Infrastructure and User Environments Build a secured, easy to use, scalable and standard base Business Network Increase your Business competitiveness thru Intel / Shiva VPN Save Money (Reduce NW Costs by 30-60%) Increase Business Speed and Flexibility Improve Security Use Existing Applications, Infrastructure and User Environments Build a secured, easy to use, scalable and standard base Business Network Increase your Business competitiveness thru Intel / Shiva VPN

19 Thank You