Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?

Slides:



Advertisements
Similar presentations
Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
Advertisements

1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Module 5: Configuring Access for Remote Clients and Networks.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
VPNs Virtual Private Networks. VPNs: Purpose Emulate a private network using shared Service Provider infrastructure Same policies as private network What.
Virtual Private Networks Globalizing LANs Timothy Hohman.
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
Virtual Private Networking Karlene R. Samuels COSC513.
Internet Security Seminar Class CS591 Presentation Topic: VPN.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Remote Networking Architectures
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Virtual Private Network
Chapter 11: Dial-Up Connectivity in Remote Access Designs
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
Virtual Private Networks Alberto Pace. IT/IS Technical Meeting – January 2002 What is a VPN ? u A technology that allows to send confidential data securely.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
VPN Protocol What is a VPN? A VPN is A network that uses Internet or other network service to transmit data. A VPN includes authentication and.
Module 4: Designing Routing and Switching Requirements.
1 Chapter 12: VPN Connectivity in Remote Access Designs Designs That Include VPN Remote Access Essential VPN Remote Access Design Concepts Data Protection.
Module 11: Remote Access Fundamentals
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Module 5: Configuring Access for Remote Clients and Networks.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Hp education services education.hp.com 10 Virtual Private Networks Version B.00 H7076S Module 2 Slides.
1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Virtual Private Network (VPN)
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
Virtual Private Networks Manraj Sekhon. What is a VPN?
VPN: Virtual Private Network Presented By: Wesam Shuldhum ID:
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks
Virtual Private Networks
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
VPN: Virtual Private Network
Virtual Private Networks (VPN)
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
Virtual Private Network
VPN: Virtual Private Network
Virtual Private Network
Topic 12: Virtual Private Networks
Presentation transcript:

Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?  How many different types of VPNs?  What are the advantages and disadvantages?  What is the VPN future scope.

Introduction  The Internet has changed the way what we do business  VPNs achieve one or more of the following goals:  connect users securely their own corporate network (remote access)  link branch offices to an enterprise network (intranet)  extend organizations' existing computing infrastructure to include partners, suppliers and customers (extranet).

What is a VPN A Virtual Private Network (VPN) is a group of two or more computer systems, typically connected to a private network (a network built and maintained by an organization solely for its own use) with limited public- network access, that communicates “securely” over a public network.

VPN Concepts  IPSEC: IP Security  L2F: Layer 2 Forward tunneling protocol  L2TP: Layer 2 Tunneling Protocol  PPP: Point-to-Point Protocol  PPTP: Point-to-Point Tunneling Protocol  QoS: Quality of Service

How VPNs Work  VPNs are placed between private and public domains in networks to enforce dedicated secure paths, or tunnels.

Security  Firewalls  Encryption  IPSec  AAA Server Authentication Authorization Accounting

Types of VPNs  Software-based VPNs  Hardware-based VPNs  Standalone VPN Application packages

Advantages of VPN  Cost Savings - replace expensive dedicated leased lines - replace modem pools and eliminate long distance dial-up fees. - increase business efficiency

Advantage of VPNs  Easy Configuration - allocating IP addresses - creating user accounts on the gateway or authentication server

Disadvantage of VPNs  VPNs require an in-depth understanding of public network security issues  The QoS depends on factors largely outside of control  VPN technologies from different vendors may not work well  VPNs need to accommodate protocols  Latency

The future of VPN  Depend mainly on industry dynamics  VPNS should increase if standards solidify and vendor products interoperate fully with other  The use of VPN will increase if companies can measure the significant value

Key VPN companies

Actual VPN Implementation