Virtual Private Network prepared by Rachna Agrawal Lixia Hou.

Slides:



Advertisements
Similar presentations
Virtual Private Networks COSC541 Project Jie Qin & Sihua Xu October 11, 2014.
Advertisements

Guide to Network Defense and Countermeasures Second Edition
1 Intel / Shiva VPN Solutions Stephen Wong System Engineer.
VPN: Virtual Private Network Presented by: Germaine Bacon Lizzi Beduya Betty Huang Jun Mitsuoka Juliet Polintan.
Securing Remote PC Access to UNIX/Linux Hosts with VPN or SSH Charles T. Moetului WRQ, Inc. (206)
Setting Up a Virtual Private Network Chapter 9. Learning Objectives Understand the components and essential operations of virtual private networks (VPNs)
11 Setting Up a Virtual Private Network
SCSC 455 Computer Security Virtual Private Network (VPN)
1 Configuring Virtual Private Networks for Remote Clients and Networks.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Eric Kilroy. Introduction  Virtual Private Network A way to connect to a private network through a public network such as the internet.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
In this section, we'll cover one of the foundations of network security issues, It talks about VPN (Virtual Private Networks). What..,Why..,and How….?
Goal of The Paper  What exactly is a VPN?  Why do you need a VPN?  what are some of the technologies used in deploying a VPN?  How does a VPN work?
Virtual Private Networking Karlene R. Samuels COSC513.
Internet Security Seminar Class CS591 Presentation Topic: VPN.
VIRTUAL PRIVATE NETWORKS (VPN)
VPN – Technologies and Solutions CS158B Network Management April 11, 2005 Alvin Tsang Eyob Solomon Wayne Tsui.
Remote Networking Architectures
Virtual Private Networks
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
Virtual Private Networks (VPN’s)
1 © J. Liebeherr, All rights reserved Virtual Private Networks.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Virtual Private Network
Virtual Private Networks (Tunnels). When Are VPN Tunnels Used? VPN with PPTP tunnel Used if: All routers support VPN tunnels You are using MS-CHAP or.
Understanding VPN Concepts Virtual Private Network (VPN) enables computers to –Communicate securely over insecure channels –Exchange private encrypted.
1 Wide Area Network. 2 What is a WAN? A wide area network (WAN ) is a data communications network that covers a relatively broad geographic area and that.
1 L2TP OVERVIEW 18-May Agenda VPN Tunneling PPTP L2F LT2P.
Copyright © 2004 Juniper Networks, Inc. Proprietary and Confidentialwww.juniper.net 1 IPSec or SSL VPN? Decision Criteria.
Chapter 11: Setting up a Virtual Private Network.
Virtual Private Network (VPN) SCSC 455. VPN A virtual private network that is established over, in general, the Internet – It is virtual because it exists.
VIRTUAL PRIVATE NETWORKS (VPN) BY: Sajal Soni Abhishek sahu Deepti Singh Deeksha sahu Yashika chourasia Subhash dewangan.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
VPN Virtual Private Networks
Virtual Private Network (VPN). ©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential “ If saving money is wrong, I don’t want.
12-Sep-15 Virtual Private Network. Why the need To transmit files securely without disclosing sensitive information to others in the Internet.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Module 4: Designing Routing and Switching Requirements.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Virtual Private Network (VPN) Topics Discussion What is a VPN? What is a VPN?  Types of VPN  Why we use VPN?  Disadvantage of VPN  Types of.
Guide to Firewalls and VPNs, 3 rd Edition Chapter Ten Setting Up A Virtual Private Network.
Hands-On Microsoft Windows Server Introduction to Remote Access Routing and Remote Access Services (RRAS) –Enable routing and remote access through.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Generic Routing Encapsulation GRE  GRE is an OSI Layer 3 tunneling protocol: Encapsulates a wide variety of protocol packet types inside.
VPN. What is VPN An arrangement that provides connections between: An arrangement that provides connections between: –Offices –remote workers and –the.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Providing Teleworker Services Accessing the WAN – Chapter 6.
Providing Teleworker Services
Virtual Private Network (VPN)
©2001 Check Point Software Technologies Ltd. - Proprietary & Confidential outline What is a VPN? What is a VPN?  Types of VPN.
VIRTUAL PRIVATE NETWORKS (VPN) By s k satapathy s k satapathy clicktechsolution.com.
Virtual Private Networks Manraj Sekhon. What is a VPN?
VPN Alex Carr. Overview  Introduction  3 Main Purposes of a VPN  Equipment  Remote-Access VPN  Site-to-Site VPN  Extranet Based  Intranet Based.
VIRTUAL PRIVATE NETWORKS Lab#9. 2 Virtual Private Networks (VPNs)  Institutions often want private networks for security.  Costly! Separate routers,
Virtual Private Network Wo Yan Lam. Overview What is Virtual Private Network Different types of VPN –Remote-Access VPN –Site-to-site VPN Security features.
Virtual Private Network Technology Nikki London COSC 352 March 2, 2010.
SECURITY IN VIRTUAL PRIVATE NETWORKS PRESENTED BY : NISHANT SURESH.
Virtual Private Networks
Virtual Private Network
Virtual Private Networks (VPN)
Virtual Private Networks
Virtual Private Network (VPN)
VIRTUAL PRIVATE NETWORKS (VPN)
Virtual Private Network (VPN)
Seminar Class CS591 Presentation Topic: VPN
Virtual Private Network
Firewalls Routers, Switches, Hubs VPNs
Cengage Learning: Computer Networking from LANs to WANs
Topic 12: Virtual Private Networks
Presentation transcript:

Virtual Private Network prepared by Rachna Agrawal Lixia Hou

Virtual Private Network (VPN) VPNs are private data networks over public network – usually the Internet. VPNs extend corporate networks to remote offices, mobile users, telecommuters and other extranet partners. VPNs use advanced encryption and ‘tunneling’ technology to establish secure, end-to-end private network connections over Internet.

A typical VPN

VPN Solutions Remote access VPNs establish secure, encrypted connections between mobile or remote users and their corporate networks via a third-party network, such as a Internet Service Provider(ISP) - VPN client – software, hardware as well as router, or firewall based solutions available. - Reduced cost of long distance access calls and internal equipment inventory

VPN Solutions Site-to-Site VPNs are an alternative WAN infrastructure that used to connect branch offices, home offices, or business partners' sites to all or portions of a company's network. - Intranet VPNs provide full access to company’s network - Extranet VPNS provide business partners with limited access to a company’s network

VPN Technology Trusted VPNs – companies lease circuits from communication providers and use them in the same manner they use physical cables in a private LAN - Communication provider is ‘trusted’ for data integrity and security. - Used before Internet became universal

VPN Technology Secure VPNs use Internet as a corporate communication medium. Data is encrypted before sending, moved over to Internet, and then decrypted at the receiving end. - Encryption creates a security ‘tunnel’ that can’t be attacked - More desirable than Trusted VPNs

VPN Technology Hybrid VPNs – A secure VPN is created as part of the trusted VPN thus creating a ‘hybrid’ VPN. Secure part of the VPN is usually administered by customer (using VPN equipments). Secure VPNs that are administered by ISPs are called provider-provisioned VPNs.

VPN Building Blocks Security is built around authentication, authorization, and accounting capabilities. Network, data, and addresses are encrypted so they are understood by right sender and receiver only.

VPN Building Blocks Quality of Service addresses two fundamental requirements – predictable performance and policy implementation QoS capabilities allow users to prioritize service classes, manage bandwidth, and avoid congestion. Pkt. classification based on IP address, TCP/UDP port no, IP precedence(3bits in the ToS field of IP header), MAC address, URLs & sub-URLs

VPN Building Blocks Management of devices – ‘simpler is better’ Element-based – less expensive. adequate for managing & monitoring small setup Policy-based – centralized for larger networks, policies established and push them to all applicable devices Outsource VPN management to the ISP or SASP

VPN Building Blocks VPNs provide reliable access to network VPN software allows transmitted data packets to transparently switch over to a different path in case of a device failure Redundancy in hardware components reduces the risk of downtime

VPN: making choices Do-it-Yourself VPNs - four basic areas of consideration: - Internet Service - Security Policy Server - A Public Key Infrastructure (PKI) system - VPN gateway solution

VPN Gateways VPN gateways can be categorized as Standalone or Integrated. Standalone VPNs incorporate purpose-built devices between - the source of data and WAN link OR between the modem and a data source in a remote office. Integrated implementations add VPN functionality to existing devices such as routers, firewalls.

Gateway Solutions Router based VPNs – adding encryption support to existing router(s) can keep the upgrade costs of VPN low. Firewall based VPNs – workable solution for small networks with low traffic volume. Software based VPNs – good solution for better understanding a VPN, software runs on existing servers and share resources with them

Gateway Solutions Internet Security Devices – Standalone VPN devices specifically designed for tunneling, encryption, authentication are easier to setup and make attractive choice for business looking for ‘turn key’ solutions

Outsourcing Things to consider before outsourcing - For connecting remote offices consider an ISP that also offers POP to connect to Internet as a local call Redundancy of equipment, connections, and people Provider policies, equipment, employee qualification to deal with outside hackers and viruses On-site consulting assistance

VPN Protocols IPSec – Internet standard protocol for tunneling. Encryption, and authentication. Layer2Tunneling Protocol (L2TP) – Provides a means for tunneling IP traffic in layer 2, encloses non-Internet protocols i.e. IPX, SNA, and AppleTalk inside IP envelope. Point-to-Point tunneling - proprietary Microsoft

Benefits of using VPN Lower costs – remote access costs have reduced by 80 percent while LAN-to-LAN connectivity costs is reduced by percent. For companies just setting up their network VPN provides low-cost alternative to backbone equipment, in-house terminal equipment and access modems. Connectivity Improvements – VPN based links are easy and inexpensive ways to meet changing business demands.

Benefits of VPN Anywhere anytime access – ubiquitous public internet offers transparent access to central corporate systems i.e. , directories, internal-external web-sites. VPN technology is improving rapidly and promises a bright future for data communication, its cost-effective, and high returns on investment will outweigh any skittishness in investing in new technology.