TCP/IP Protocol Suite 1 Upon completion you will be able to: Virtual Private Networks and Network Address Translation Understand the difference between.

Slides:



Advertisements
Similar presentations
ITGS: MUST KNOW TERMS NETWORK. Internet Global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve.
Advertisements

Natting NATTING. Private vs Public IP Addresses Whatever connects directly into Internet must have public (globally unique) IP address There is a shortage.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
COS 420 Day 18. Agenda Assignment 4 Posted Chap Due April 6 Group project program requirements Submitted but Needs lots of work Individual Project.
Remote Desktop Connection Techniques Wireless Communication Networks.
VPNs Virtual Private Networks. VPNs: Purpose Emulate a private network using shared Service Provider infrastructure Same policies as private network What.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Virtual Private Networks Globalizing LANs Timothy Hohman.
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
Virtual Private Networking Karlene R. Samuels COSC513.
TCP/IP Protocol Suite 1 Chapter 26 Upon completion you will be able to: Virtual Private Networks and Network Address Translation Understand the difference.
Introduction 2: Internet, Intranet, and Extranet J394 – Perancangan Situs Web Program Sudi Manajemen Universitas Bina Nusantara.
Remote Networking Architectures
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Virtual Private Network
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
1 Telecommunications, the Internet, Intranets, and Extranets CSC101 SECTIONS 01 & 02.
Business Computing 550 Lesson 4. Fundamentals of Information Systems, Fifth Edition Chapter 4 Telecommunications, the Internet, Intranets, and Extranets.
Intranet, Extranet, Firewall. Intranet and Extranet.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
The Internet, Intranets, & Extranets Chapter 7. IS for Management2 The Internet (1) A collection of networks that pass data around in packets, each of.
Computer Networks Unit 1 – BTA 3O Ms. Chytra. Introduction to Networks Most people working in an office with more than a few computers will be using some.
1 An Overview of Telecommunications Telecommunications: the electronic transmission of signals for communications Telecommunications medium: anything that.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Private Network Interconnection Chapter 20. Introduction Privacy in an internet is a major concern –Contents of datagrams that travel across the Internet.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
McGraw-Hill © ©The McGraw-Hill Companies, Inc., 2004 Chapter 31 Security Protocols in the Internet.
CCNA 1 v3.0 Module 2 Networking Fundamentals. Objectives.
The University of Oklahoma Virtual Private Network How it works.
The Intranet.
Chapter 13 The Internet.
Fundamentals of Information Systems, Second Edition 1 Telecommunications, the Internet, Intranets, and Extranets.
Module 10: Providing Secure Access to Remote Offices.
Virtual Private Networks Manraj Sekhon. What is a VPN?
COMPUTER INTERNET, INTRANET & EXTRANET. INTERNET 1) It is a worldwide system which has the following characteristics: 2) Internet is a world-wide / global.
Virtual Private Networks (VPN) By Donald Brown. What is a VPN? A network that uses the internet, to provide remote offices or individual users with a.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network (VPN) 1. A corporation with multiple geographic sites can use one of two approaches to building a corporate intranet. – Private.
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
Defining Network Infrastructure and Network Security Lesson 8.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks
Virtual Private Networks
Virtual Private Networks (VPN)
Virtual Private Networks
The Intranet.
Virtual Private Network (VPN)
Virtual Private Networks,
Virtual Private Networks
Internet and Intranet.
Virtual Private Networks (VPN)
Internet and Intranet.
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
Virtual Private Network
Security Protocols in the Internet
Firewalls Routers, Switches, Hubs VPNs
VPN What, where, who, why when?.
Remote Access Services RAS Routing and Remote Access Services RRAS Remote Desktop Terminal Services Virtual Private Networking VPN.
Virtual Private Networks and Network Address Translation
Internet and Intranet.
Virtual Private Networks and Network Address Translation
Cengage Learning: Computer Networking from LANs to WANs
Internet and Intranet.
Topic 12: Virtual Private Networks
Presentation transcript:

TCP/IP Protocol Suite 1 Upon completion you will be able to: Virtual Private Networks and Network Address Translation Understand the difference between an internet and an extranet Understand private, hybrid, and virtual private networks Understand how VPN can guarantee privacy Understand the mechanism of NAT Objectives

TCP/IP Protocol Suite PRIVATE NETWORKS A private network is designed to be used only inside an organization. It allows access to shared resources and, at the same time, provides privacy. The topics discussed in this section include: IntranetExtranetAddressing

TCP/IP Protocol Suite 3 Table 26.1 Addresses for private networks

TCP/IP Protocol Suite VIRTUAL PRIVATE NETWORKS (VPN) Virtual private network (VPN) is a technology for large organizations that use the global Internet for both intra- and interorganization communication, but require privacy in their intraorganization communication. The topics discussed in this section include: Achieving Privacy VPN Technology

TCP/IP Protocol Suite 5 Figure 26.1 Private network

TCP/IP Protocol Suite 6 Figure 26.2 Hybrid network

TCP/IP Protocol Suite 7 Figure 26.3 Virtual private network

TCP/IP Protocol Suite 8 Virtual private network A typical VPN might have a main LAN at the corporate headquarters of a company, other LANs at remote offices or facilities and individual users connecting from out in the field.LAN

TCP/IP Protocol Suite 9 VPN Types: Remote Access VPN Intranet VPN Extranet VPN

TCP/IP Protocol Suite 10 Remote-Access VPN Remote-Access VPN also called a virtual private dial-up network (VPDN), is a user-to-LAN connection used by a company that has employees who need to connect to the private network from various remote locations. Intranet-based - If a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect LAN to LAN. Extranet-based - When a company has a close relationship with another company (for example, a partner, supplier or customer), they can build an extranet VPN that connects LAN to LAN, and that allows all of the various companies to work in a shared environment.

TCP/IP Protocol Suite 11 Figure 26.4 Tunneling tunneling is the process of placing an entire packet within another packet and sending it over a network. You can place a packet that uses a protocol not supported on the Internet (such as NetBeui) inside an IP packet and send it safely over the Internet. Or you could put a packet that uses a private (non- routable) IP address inside a packet that uses a globally unique IP address to extend a private network over the Internet.globally unique IP address

TCP/IP Protocol Suite 12 Figure 26.5 Addressing in a VPN

TCP/IP Protocol Suite NETWORK ADDRESS TRANSLATION (NAT) Network address translation (NAT) allows a site to use a set of private addresses for internal communication and a set of global Internet addresses for communication with another site. The site must have only one single connection to the global Internet through a router that runs NAT software. The topics discussed in this section include: Address Translation Translation Table NAT and ISP

TCP/IP Protocol Suite 14 Figure 26.6 NAT

TCP/IP Protocol Suite 15 Figure 26.7 Address translation

TCP/IP Protocol Suite 16 Figure 26.8 Translation

TCP/IP Protocol Suite 17 Table 26.2 Five-column translation table

TCP/IP Protocol Suite 18 Figure 26.9 An ISP and NAT