Virtual Private Network

Slides:



Advertisements
Similar presentations
Computer networks Fundamentals of Information Technology Session 6.
Advertisements

Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
Agenda Virtual Private Networks (VPNs) Motivation and Basics Deployment Topologies IPSEC (IP Security) Authentication Header (AH) Encapsulating Security.
Virtual Private Networks. Why VPN Fast, secure and reliable communication between remote locations –Use leased lines to maintain a WAN. –Disadvantages.
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
VIRTUAL PRIVATE NETWORKS (VPN). GROUP MEMBERS ERVAND AKOPYAN ORLANDO CANTON JR. JUAN DAVID OROZCO.
Remote Desktop Connection Techniques Wireless Communication Networks.
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
TCP/IP Protocol Suite 1 Upon completion you will be able to: Virtual Private Networks and Network Address Translation Understand the difference between.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Virtual Private Networks Globalizing LANs Timothy Hohman.
VPN’s Kristin Belanger. VPN’s Accommodate employees at distant offices Accommodate employees at distant offices Usually set up through internet Usually.
Virtual Private Networks Ba 378 Winter What is a VPN? A VPN is a private network linked to a public network, using the internet as its transfer.
Virtual Private Networking Karlene R. Samuels COSC513.
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Remote Networking Architectures
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Virtual Private Network prepared by Rachna Agrawal Lixia Hou.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
1 Virtual Private Network (VPN) Course: COSC513 Instructor: Professor M. Anvari Student: Xinguang Wang.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Providing Teleworker Services
Virtual Private Network. VPN In the most basic definition, VPN is a connection which allows 2 computers or networks to communicate with each other across.
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
Virtual Private Network (VPN)
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
Virtual Private Networks Manraj Sekhon. What is a VPN?
Lect 8 Tahani al jehain. Types of attack Remote code execution: occurs when an attacker exploits a software and runs a program that the user does not.
Virtual Private Networks (VPN) By Donald Brown. What is a VPN? A network that uses the internet, to provide remote offices or individual users with a.
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network (VPN) 1. A corporation with multiple geographic sites can use one of two approaches to building a corporate intranet. – Private.
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Providing Teleworker Services
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
Virtual Private Networks
Virtual Private Networks (VPN)
Need for VPN As a business grows, it might expand to multiple shops or offices across the country and around the world. the people working in those locations.
Virtual Private Network (VPN)
Virtual Private Network
Topic 12: Virtual Private Networks
Presentation transcript:

Virtual Private Network Tahani Aljehani

Why VPN? In today’s economy, companies have dramatically expanded the scope of their businesses. They may need to set up offices and facilities across the country or even around the world. How to maintain fast, secure and reliable communications among different business locations and remote users becomes very important for those businesses.

Why VPN? When a company tries to connect its private networks together using a public resource, meaning the wires and routers that make up the Internet, it has no control over the other people who are using the public resource. This leaves the company susceptible to security issues when the data is transmitted between private networks over the Internet. The older solution is to build a dedicated and direct connection, such as a leased line, between private networks that can only be used by the authorized users of the company. Virtual private network (VPN) provides a solution for an organization to use a public network infrastructure, such as the Internet, to offer secure and reliable data communication between its private networks at different geographic locations

Virtual Private Network VPN stands for Virtual Private Network. It is a network infrastructure constructed over a public infrastructure (i.e. the Internet) to deliver private network services. A VPN permits companies, through the use of security mechanisms such as encryption and tunneling, to establish secure and encrypted connections between private networks over the Internet.

Figure :A typical VPN

Virtual Private Network VPN is transparent to end users End users do not need any knowledge about VPN components and how to establish a VPN connection to access the corporate LAN

VPN benefits 1- Security – VPN provides a high level of security using advanced security methods (e.g. encryption and authentication) that protect data from unauthorized access. It uses the Internet as the medium for transporting data, while maintaining the privacy of communications to ensure only authorized users can access the network and the data cannot be intercepted. It completely hides you from others on the public network infrastructure.

VPN benefits 2- Scalability – VPN that utilizes the Internet enables companies to add large amount of capacity without adding significant infrastructure. A VPN can grow to accommodate more users and different locations as long as the Internet access is available. Adding additional components to a VPN infrastructure is much easier than a lease line system previously used by many companies.

VPN benefits 3- Flexibility – VPN allows a company to keep its employees and partners securely connected to central network resources no matter where they are. It provides access to the entire network with any-to- any connectivity. VPN can be developed with different applications such as Full-Mesh topology for voice and Hub-and- Spoke for Internet access.

VPN benefits 4- Cost effectiveness – VPN helps to reduce connectivity charges and operational costs due to the sharing of Internet infrastructure. It enables network connections between sites by utilizing Internet to connect remote offices and remote users to the main corporate site. The cost of traditional lease lines, by contrast, can increases dramatically as an organization grows with more remote users and offices added to its corporate network.

VPN Types There are two common types of VPN networks: remote access site-to-site

Remote Access VPN A remote access VPN allows remote employee and telecommuters to securely connect to the company’s corporate network inexpensively using the Internet or an Internet Service Provider’s (ISP’s) backbone. It is also called a virtual private dial-up network (VPDN). In the past, the company supported remote users through a toll-free call to reach the company’s private network directly. With the advent of VPN, the remote users can make a local call to their ISP and use the VPN client software on their computers to access the company’s private network. They can basically access the company via the Internet from wherever they are.

Remote Access VPN remote-access VPN follows a client and server approach. All the remote user requires is a computer with VPN client software and connectivity to the Internet or ISP network via a dial-in or Ethernet connection

Remote access VPN model

Remote Access VPN 1- The remote user is connected to the Internet through either dial-up or Ethernet connection. 2- The VPN client on the user’s computer establishes a secure VPN connection to the VPN server maintained at the corporate network. 3- The request from the user is encrypted and then sent to the VPN server through the VPN connection. 4- The data is encrypted until it reaches the VPN server. 5- The VPN server then decrypts the received data and forwards it on to the target application server. 6- Thus the remote user can communicate with the application server just as securely over the public network as if it resided on the internal corporate LAN.

Remote Access VPN the information that the user sends out will lose its VPN level of protection when the VPN server receives it and sends it along to the application server. After that point, security is the user's and the application server's responsibility. For example, you should not send password or credit card information to a Web page that is not SSL-encrypted (e.g., a page does not begin with https://), even if you're using a VPN connection a VPN client does not replace antivirus software, operating system and any local-area networking security practices. A virus that is downloaded in an encrypted packet will still infect your system when your VPN client decrypts it for your applications to read.

Site-to-Site VPN Site-to-site VPN can be used to connect a company’s multiple fixed sites, such as remote offices and central offices, over the Internet. It has replaced a lease line or frame relay connection often used previously by companies to connect sites Intranet VPN Extranet VPN

Site-to-site VPN model

Site-to-Site VPN the remote sites use the VPN router to provide both firewall function and VPN connectivity between two sites. When information is transmitted from one location to anther, the VPN router at one location encrypts information before sending it through the VPN connection on the Internet. At the other location, the receiving VPN router decrypts the information into clear-text and sends it to its LAN.

Cisco solutions Cisco has VPN products to support both remote- access VPN and site-to-site VPN. For remote access VPNs, there are Cisco VPN 3000 Series Concentrators, the PIX Firewall and the Cisco VPN client. For site-to-site VPNs, there are Cisco VPN routers and the PIX Firewall.

VPN Security Mechanisms Firewall-based VPN Encryption IPSec AAA Server

Firewall-based VPN A firewall provides a strong barrier between your private network and the Internet. A firewall-based VPN can manage the VPN network, terminate the VPN sessions, and also take advantage of the firewall’s built-in security mechanisms, such as restricting access to the internal network. It may also perform network address translation from a public IP address to the corporate office private IP address.

Encryption Encryption is the security mechanism that provides the ‘P’ (privacy) in VPN. In a VPN network, the data is encrypted by using different encryption protocols at the sending end and decrypted at the receiving end. An additional level of security involves encrypting not only the data, but also the originating and receiving network addresses. Popular encryption methods include Data Encryption Standard (DES), Triple DES (3DES)

Internet Protocol Security (IPSec) Internet Protocol Security (IPSec) is a security protocol used by most VPNs to set up private connections that span the Internet between the separate company sites. It is designed to address data confidentiality, integrity, authentication and key management in addition to tunneling.

Internet Protocol Security (IPSec)(2) Tunneling allows you to encapsulate a packet within a packet to accommodate incompatible protocols. The packet within the packet could be of the same protocol or of a completely foreign one. For example, tunneling can be used to send IPX packets over the Internet so that a user can connect to an IPX-only Novell server remotely. With tunneling you can also encapsulate an IP packet within another IP packet

AAA server For a more secure access in a remote-access VPN, the request to establish a session from a dial-up client can be sent to an AAA (authentication, authorization and accounting) server to check the following: Who you are (authentication) What you can do (authorization) What you actually do (accounting)