VIRTUAL PRIVATE NETWORKS (VPN). GROUP MEMBERS ERVAND AKOPYAN ORLANDO CANTON JR. JUAN DAVID OROZCO.

Slides:



Advertisements
Similar presentations
Encrypting Wireless Data with VPN Techniques
Advertisements

Guide to Network Defense and Countermeasures Second Edition
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
1 Chapter 2: Networking Protocol Design Designs That Include TCP/IP Essential TCP/IP Design Concepts TCP/IP Data Protection TCP/IP Optimization.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Guide to Network Defense and Countermeasures Second Edition
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
Internet Security Seminar Class CS591 Presentation Topic: VPN.
Remote Networking Architectures
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Network Security Philadelphia UniversitylAhmad Al-Ghoul Module 12 Module 12 Virtual Private Networks  MModified by :Ahmad Al Ghoul  PPhiladelphia.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
Virtual Private Network
NetComm Wireless VPN Functionality Feature Spotlight.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L7 1 Network Security 2 Module 6 – Configure Remote Access VPN.
VPN Wireless Security at Penn State Rich Cropp Senior Systems Engineer Information Technology Services The Pennsylvania State University © All rights.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 7: Securing Site-to-Site Connectivity Connecting Networks.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
SYSTEM ADMINISTRATION Chapter 13 Security Protocols.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
What Is Needed to Build a VPN? An existing network with servers and workstations Connection to the Internet VPN gateways (i.e., routers, PIX, ASA, VPN.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
WAN Technologies Dial-up modem connections
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
CIT 384: Network AdministrationSlide #1 CIT 384: Network Administration VPNs.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
C3 confidentiality classificationIntegrated M2M Terminals Introduction Vodafone MachineLink 3G v1.0 1 Vodafone MachineLink 3G VPN functionality Feature.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
The University of Oklahoma Virtual Private Network How it works.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
© 2007 Cisco Systems, Inc. All rights reserved.ISCW-Mod3_L5 1 Implementing Secure Converged Wide Area Networks (ISCW) Module 3.1.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
V IRTUAL P RIVATE N ETWORKS K ARTHIK M OHANASUNDARAM W RIGHT S TATE U NIVERSITY.
Network Access for Remote Users Dr John S. Graham ULCC
Virtuelne Privatne Mreže 1 Dr Milan Marković. VPN implementations  In the following sections we will discuss these popular VPN implementation methods,
Securing Access to Data Using IPsec Josh Jones Cosc352.
 Router › A router is the networking device that integrates two or more networks together, while controlling the data traffic over the entire network.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
VPN’s Andrew Stormer COSC 356 Fall What is a VPN? Acronym – Virtual Private Network Acronym – Virtual Private Network Connects two or more private.
Virtual Private Networks
Providing Teleworker Services
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
VPN: Virtual Private Network
CIT 480: Securing Computer Systems
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
VPN: Virtual Private Network
Cengage Learning: Computer Networking from LANs to WANs
Topic 12: Virtual Private Networks
Presentation transcript:

VIRTUAL PRIVATE NETWORKS (VPN)

GROUP MEMBERS ERVAND AKOPYAN ORLANDO CANTON JR. JUAN DAVID OROZCO

AGENDA What is a VPN? VPN SOLUTION Advantages/Disadvantage Software VPN Client Hardware VPN Configuration VPN SETUP’s Security Type’s

What is VPN? Maintaining privacy through the use of a tunneling protocol and security procedures Provide remote access to an organization's network via the Internet Point-to-Point Tunneling Protocol, Layer 2 tunneling protocol and IP Security

VPN SOLUTION ADVANTAGE VPN lowers costs is by eliminating the need for expensive long-distance leased lines Data transfers are encrypted Cost is low to implement

VPN SOLUTION DISATVANTAGE OF VPN VPN Connection is slow Performance issues are a major, and legitimate, concern to the VPN user Bad Hardware and low speed connection on the user end

VPN CLIENT SOFTWARE

Questions to Ask To configure and use the VPN Client Hostname or IP address of the secure gateway to which you are connecting. Your IPSec Group Name (for preshared keys). Your IPSec Group Password (for preshared keys). If authenticating with a digital certificate, the name of the certificate. If authenticating through the secure gateway's internal server, your username and password. If authenticating through an NT Domain server, your username and password.

Installation screens

Software GUI

VPN ROUTER Hardware VPN Router

VPN HARDWARE Model: RV042 - Data Transfer Rate: 100 Mbps BASE TX - Fast Ethernet Ideal for use in small business environments Allows multiple computers in an office share an Internet connection. Price Range: $137 to $174 Linksys 10/100 4-Port VPN Router

VPN Information Data Transfer Rate: 54 Mbps GHz – 328 ft Indoor Range 1312 ft Outdoor Range A 4-Port Wireless Ethernet Broadband Router with VPN (Virtual Private Network) capability. Allows users to securely connect multiple computers over the Internet via IPSec, PPTP, or L2TP tunnels. Price Range: $104 to $180 D-Link AirPlus Xtreme G Wi-Fi Router

VPN Information Netgear ProSafe VPN Firewall 8 Port FVS114 Provides business class protection. Perfect for telecommuters and remote offices. 4 10/100 Mbps auto-sensing, Auto Uplink switched LAN ports and Network Address Translation (NAT) routing Up to 253 users can access your broadband connection at the same time.

VPN Information SSL-VPN 2000 Seamless Integration Behind Virtually Any Firewall The SSL-VPN 2000 integrates seamlessly into any network topology and can be easily deployed alongside almost any third-party firewall as a secure remote access solution. When deployed with a SonicWALL Internet security appliance running SonicWALL Gateway Anti-Virus, Anti-Spyware and Intrusion Prevention Service, the SSL-VPN 2000 enhances network integration and security.

VPN Information Nortel VPN Security Gateway 3050 A remote access security solution that extends the reach of enterprise applications and resources to remote employees, partners, and customers. Offers a convenient alternative for securely provisioning resources for remote users without the need to install and manage client tunneling software on their PCs.

VPN for Large Businesses Cisco VPN 3000 Concentrator scalable encryption processing (SEP) modules, that enable users to easily increase capacity and throughput. The concentrators are offered in models suitable for everything from small businesses with up to 100 remote-access users to large organizations with up to 10,000 simultaneous remote users.

Configuring NetGear FSV318

VPN Hardware Configuration

ENCRYPTION Encryption Schemes Standard (DES) Standard (DES) – 20 Year Old complex symmetric algorithm less scecure then new ones Triple DES and 3DES- Triple DES and 3DES- use multiple passes of the original version to increase the key length, thus strengthening security Encapsulated Security Payload or Outer Cipher Block Chaining, can be used to further scramble the data, and maintain or verify its integrity

VPN SETUP

Site to Site Connection GRE (generic routing encapsulation) is normally the encapsulating protocol that provides the framework for how to package the passenger protocol for transport over the carrier protocol, which is typically IP-based.

Remote Access VPN

IPSEC IP Security- a set of protocols developed by the IETF to support secure exchange of packets at the IP layer. Encryption modes: Transport and Tunnel. Transport mode encrypts only the data portion (payload) of each packet, but leaves the header untouched. The more secure Tunnel mode encrypts both the header and the payload. On the receiving side, an IPSec-compliant device decrypts each packet. For IPsec to work, the sending and receiving devices must share a public key. This is accomplished through a protocol known as Internet Security Association and Key Management Protocol/Oakley (ISAKMP/Oakley), which allows the receiver to obtain a public key and authenticate the sender using digital certificates.

Tunneling Tunneling requires three different protocols: Carrier protocol - The protocol used by the network that the information is traveling over Encapsulating protocol - The protocol (GRE, IPSec, L2F, PPTP, L2TP) that is wrapped around the original data Passenger protocol - The original data (IPX, NetBeui, IP) being carried

PPP Tunneling L2F (Layer 2 Forwarding) - Developed by Cisco, L2F will use any authentication scheme supported by PPP. PPTP (Point-to-Point Tunneling Protocol) - PPTP supports 40-bit and 128- bit encryption and will use any authentication scheme supported by PPP. L2TP (Layer 2 Tunneling Protocol) - L2TP Combining features of both PPTP and L2F, L2TP also fully supports IPSec. PPP (Point-to-Point Protocol)

References