Virtual Private Networks Globalizing LANs Timothy Hohman.

Slides:



Advertisements
Similar presentations
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
Advertisements

Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Module 5: Configuring Access for Remote Clients and Networks.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
VPN – Virtual Private Networking. VPN A Virtual Private Network (VPN) connects the components of one network over another network. VPNs accomplish this.
Remote Networking Architectures
Network Address Translation, Remote Access and Virtual Private Networks BSAD 146 Dave Novak Sources: Network+ Guide to Networks, Dean 2013.
Virtual Private Network (VPN) © N. Ganesan, Ph.D..
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
VPN TUNNELING PROTOCOLS PPTP, L2TP, L2TP/IPsec Ashkan Yousefpour Amirkabir University of Technology.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Virtual Private Network
Module 11: Supporting Remote Users. Overview Establishing Remote Access Connections Connecting to Virtual Private Networks Configuring Authentication.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Virtual Private Networks Alberto Pace. IT/IS Technical Meeting – January 2002 What is a VPN ? u A technology that allows to send confidential data securely.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 23 Virtual Private Networks (VPNs)
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
CHAPTER 2 PCs on the Internet Suraya Alias. The TCP/IP Suite of Protocols Internet applications – client/server applications The client requested data.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 © 2004 Cisco Systems, Inc. All rights reserved. Case Study: Cisco VPN Client Cisco Information Technology May 19, 2004.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
Virtual Private Network Benefits Classification Tunneling technique, PPTP, L2TP, IPSec Encryption Technology Key Management Technology Authentication Settings.
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Virtual Private Network (VPN)
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
Virtual Private Networks Manraj Sekhon. What is a VPN?
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks
Virtual Private Networks
Case Study: Cisco VPN Client
Virtual Private Networks
Virtual Private Network
Virtual Private Networks
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Network
Virtual Private Networks (VPN)
Virtual Private Networks
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
Virtual Private Network
Topic 12: Virtual Private Networks
Presentation transcript:

Virtual Private Networks Globalizing LANs Timothy Hohman

What is A VPN? ► Tell me about it Microsoft:  “A virtual private network (VPN) is the extension of a private network that encompasses links across shared or public networks like the Internet.” (Microsoft, 2001) ► It provides LAN access to end systems not physically located on the LAN ► An alternative to WAN (Wide Area Networks) which use leased lines to connect

Image courtesy Cisco Systems, Inc. A typical VPN might have a main LAN at the corporate headquarters of a company, other LANs at remote offices or facilities and individual users connecting from out in the field. Image courtesy Cisco Systems, Inc. A typical VPN might have a main LAN at the corporate headquarters of a company, other LANs at remote offices or facilities and individual users connecting from out in the field.LAN

How does it work? ► Data is encrypted (cannot be deciphered without the key) ► Virtual Point to Point Connection  To the user, it acts like a point to point connection ► Data is packaged with a header

Benefits of Using VPN ► Expand Globally ► Costs reduced  No dedicated lines necessary ► Easier ► Technology is on the end systems, which makes it more scalable ► No single point of failure ► Easier Network Management

Types of VPN ► Two Types:  Site to Site VPN  Remote Access VPN

Remote Access VPN ► Essentially provides LAN access through dial-up connection  Typically done by purchasing a NAS (Network Access Server) with a toll free number  Can instead be done through normal ISP connection using the VPN software to make a virtual connection to the LAN

Site to Site VPN ► Connects two LANs over local ISP connections ► Very useful if you need to connect a branch to a main hub (Big business) ► Much less expensive than purchasing one dedicated line between the hub and branch ► Intranet  connects remote locations from one company Extranet  connects two companies (partners) into one shared Private Network Extranet  connects two companies (partners) into one shared Private Network

Site to Site Connection

Two Ways to “Get it Done” ► Two Tunneling protocols can be used  PPTP (Point to Point Tunneling Protocol)  L2TP (Layer Two Tunneling Protocol)  Tunneling encapsulates frames in an extra header to be passed over the internet appearing as normal frames. The process includes: ► Encapsulation (adding extra frame), transmission, Decapsulation

Tunneling Protocols ► Both of these protocols support these methods:  User Authentication  Token Card Support (one time passwords)  Dynamic Address Assignment  Data Compression  Data Encryption  Key Management  Multi-protocol Support

Tunneling Protocols cont. ► Each are built on PPP (Point to Point Protocol)  4 Phases ► 1) Link Establishment - a physical link between ends ► 2) User Authentication – Password protocols used  PAP, CHAP, MS-CHAP ► 3) Call Back Control – optional  Disconnects and server calls back after authentication ► 4) Data Transfer Phase – exactly what it sounds like

Tunneling Protocols cont. ► PPTP  Uses IP datagrams for encapsulation  Uses TCP for tunnel maintenance  Uses encryption and compression ► L2TP  Encapsulation in IP, ATM, Frame Relay, X.25 ► IP when going over internet  UDP used for tunnel maintenance

Advantages ► PPTP:  No certificate infrastructure  Can be used on more operating systems  Can operate behind NATs ► L2TP:  More tools to guarantee packet integrity and data security  Require user and computer certificates  PPP authentication is encrypted (takes place after IP security check)

Security ► Many types of Security are offered including:  Firewalls  Encryption  IPSec  Certificates  AAA servers

Firewalls ► Can be used with VPN is right technology is set up on the router  Cisco 1700 router for example ► Can restrict:  The type of data being transferred  The number of ports open  Which protocols are allowed through

Encryption ► Symmetric Key Encryption (private key)  All communicating computers use the same key stored on their computer ► Asymmetric Key Encryption  Uses a Private key and a Public Key ► Private key on local computer ► Public key sent out to anyone who you want to communicate with ► Mathematically related through encryption algorithm ► Both must be used to decrypt anything sent

IPSec ► Made up of two parts  Authentication Header ► Verify data integrity  Encapsulation Security Payload ► Data integrity ► Data encryption

IPSec continued ► Authentication Header  Authentication Data  Sequence number ► Encapsulating Security Payload  Encrypt data  Another layer of integrity and authentication checks

Certificates ► Used alongside public keys  Contains: ► Certificate Name ► Owner of the public key ► Public key itself ► Expiration date ► Certificate authority  Verifies that information is coming from the private key  Can be distributed on disks, smart cards, or electronically

AAA Servers ► Authentication, Authorization, Accounting  These advanced servers ask each user who they are, what they are allowed to do, and what the actually want to do each time they connect  This allows the LAN to track usage from dial up connections and closely monitor those remotely connected as they would those physically connected.

How can I get this up and running? ► You need:  Software on each end system ► Windows: PPTP  Dedicated hardware (firewalls, routers, etc.)  Dedicated VPN server  May need NAS

A Hardware Example ► ShHMofEQ ShHMofEQ ShHMofEQ

An Example of VPN in Action ► 2001, CISCO direct-connect company filed for bankruptcy ► Changing over the 9000 employees to different direct-connect companies would be very costly and take 10 times the available staff to pull off

The VPN Solution ► User managed solution based on VPN software ► Users provide own internet connection ► Cisco provided IT support for VPN problems and provide gateway from internet to CISCO network

Benefits of the Change ► Productivity ► Employee Satisfaction  Able to work from home, making home work balance easier ► Globalization ► Flexibility ► Easier when letting employees go  Ex-employees do not have to have their dedicated line removed, rather they just lose Authentication to AAA server ► Cost, cost, cost

Things to Come ► Expansion  China and India ► Faster Upgrades  Use of Microsoft installer ► Better encryption  Advanced encryption standard ► Better compression ► Voice and Video or VPN

Things to come cont. ► Wireless vendor support  Access to employees from anywhere ► PDA support  Possible software packages to be used on PDAs ► Hardware for home client  As shown in previous clip

References ► Cisco Systems (2004). Cisco VPN Client Brings Flexibility and Cost Reduction to Cisco Remote Access Solution. Retrieved from: rk/pdf/Cisco_IT_Case_Study_VPN_Client_print.pdf rk/pdf/Cisco_IT_Case_Study_VPN_Client_print.pdf rk/pdf/Cisco_IT_Case_Study_VPN_Client_print.pdf ► Jeff Tyson (2007). How Virtual Private Network Work. Retrieved from: ► Barrel, Matthew D. (2006). Take your network anywhere. PC Magazine, 25(21), p ► Calin, Doru; McGee, Andrew R.; Chandrashekhar, Uma; Prasad, Ramjee (2006). MAGNET: An approach for secure personal networking in beyond 3g wireless networks. Bell Labs Technical Journal, 11(1), pp. 79 – 98. ► Tanner, John C. (2006). Ethernet rides the NGN wave. America’s Network, 110(2), pp